MLR Institute of Technology

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "MLR Institute of Technology"

Transcription

1 MLR Institute of Technology DUNDIGAL , HYDERABAD COMPUTER SCIENCE AND ENGINEERING Computer Programming Lab List of Experiments S.No. Program Category List of Programs 1 Operators a) Write a C program that takes two operands and one operator from the user, performs the operation and then prints the answer (Consider operators +, -, *, and %). b) Write a C program to find the area and volume of sphere. Formulas are: Area = 4*PI*R*R Volume = 4/3*PI*R*R*R. c) Write a C program to find out whether the character pressed through the keyboard is a digit or not (using conditional operator). d) Write a C program to print logic 1 if input character is capital otherwise 0. e) Write a C program to display 1 if input number is between 1 to 100 otherwise 0 by using the logical AND operator. f) Write a C program to shift the input data by two bits right. g) Write a C program to swap the values of two variables with/without using a third variable. h) Write a C program to add the individual digits of a 3-digit number by % and / operator. 2 Control Statements a) Write a C program to to print the given 3 integers in ascending order using if-else. b) Write a C program to calculate commission for the input value of sales amount. Commission is calculated as per the following rules: Commission is nil for sales amount Rs 5000/. Commission is 2% for sales when sales amount is greater than 5000 and less than equal to Commission is 5% for sales amount greater than c) A character is entered through keyboard. Write a C program to determine whether the character entered is a capital letter, a small case letter, a digit or a special symbol using if-else and switch case. The following table shows the range of ASCII values for various characters. Characters ASCII values A Z 65 90

2 a z Special symbols 0 47, 58 64, 91 96, d) Write a C program to examine a character entered from the keyboard is a lowercase letter or upper case, digit, punctuation mark or a space character. e) Write a C program to read a 3 digit number from keyboard and print it vertically using if-else. f) Write a C program to check whether a given 3 digit number is Armstrong number or not using if-else. g) Write a C program to read a week day number (0 to 6) and print the day name. h) Write a C program to provide multiple functions such as ADD, SUB, MUL, DIV and MOD using switch case. i) If cost price and selling price of an item s input through the keyboard, write a program to determine whether the seller has made profit or incurred loss. Write a C program to determine how much profit or loss incurred in percentage. j) Write a C program to find Sum of individual digits of a positive integer. k) Write a C program to generate to generate the first n terms of the Fibonacci sequence. l) Write a C program to generate all the prime numbers between 1 and n, where n is a value supplied by the user. m) Write a C program to check the given number is perfect number or not. n) Write a C program to print the factors of a given number. o) Write a C program to calculate the following sum, Sum=1 + x2/2! + X4/4! up to given n terms. p) Write a C program to find the roots of a quadratic equation. q) Write a C program to generate Pascal s triangle. r) Write a C program to find the GCD and LCM of two numbers. s) The total distance traveled by vehicle in t seconds is given by distance=ut+1/2at2 where u and a are the Initial velocity (m/sec) and acceleration (m/sec2). Write a C program to find the distance traveled at regular intervals of time given values of u and a. The program should provide the flexibility to the user to select his own time intervals and repeat the calculations for different values of u and a. t) Write a C program to find the largest and smallest number in a list of integers. u) Write a C program to read in two numbers, x and n, and then compute the sum of this geometric progression 1+x+x2+x3+...xn. For example: if n is 3 and x is 5, then the

3 program computes Print x, n, the sum. Perform error checking. For example the formula does not make sense for negative Exponents if n is less than 0. Have your program print an error message if n<0, then go back and read in the nest pair of numbers of without computing the sum. Are any values of x also illegal? If so, test for them too. v) Write a C program to print the numbers in triangular form w) Write a C program to find friendly numbers between 1 to n. x) Write a C program to print the perfect squares between 1 to 100. y) Write a C program to print the following series 1/1! + 2/2! + 3/3! + z) Write a C program to generate all combinations of 1, 2 and 3 numbers using for loop. 3 Functions a) Write a C program to find the factorial of a given number using non-recursive and recursive function. b) Write a C program to find the GCD (greatest common divisor) of two given integers using non-recursive and recursive function. c) Write a C program to Convert decimal number to binary number Convert Binary number to decimal number Using non recursive functions. d) Write a C program to print your name using recursion. e) Write a C program to print Fibonacci series using recursion. f) Write a C program to solve Towers of Hanoi problem using recursive function. g) Write a C program to print the transpose of a given matrix using function. h) Write a C program that will print the longest word written in a line using function. i) Write a C program that uses a function to search a number within an array. j) Write a C program that uses a function to scan a string that is passed as an argument and convert all characters to capital letters. k) Write a C program that uses a function to reverse a given string and use it to check whether the given string is a palindrome or not.

4 4 Arrays a) Write a C program to find minimum, maximum, sum and average of the given one dimensional array. b) Write a C program to print the alphabets A Z along with their ASCII values using array. c) Write a C program to store numbers into an array and find the frequency of a particular number in array and print it. d) Write a C program to count and display positive, negative, odd and even numbers in an array. e) Write a C program to find the largest and smallest number in a list of integers. f) Write a C program to swap the K th and (K+1) th elements in an integer array. K is given by the user. g) Write a C program to merge two sorted arrays into another array in a sorted order. h) Write a C program to print the individual digits of a number using array. i) Write a C program to print the binary equivalent of a given decimal number using array. j) Write a C program to search a given element n present in the array or not. k) Write a C program to sort the array elements in ascending order using bubble sort technique. l) Write a C program to convert a Roman letter into its decimal equivalent. m) Write a C program to find 2 s complement of a binary number. n) Write a C program to read a matrix of size mxn and print it. o) Write a C program that uses functions to perform the following Addition of two Matrices Multiplication of two Matrices 5 Pointers a) Write a C program to add two numbers using pointers. b) Write a C program to swap two numbers using pointers. c) Write a C program to find the length of string using pointers. d) Write a C program to compare two strings using pointers. e) Write a C program to copy a string from source to destination using pointers. f) Write a C program to reverse a string using pointers. 6 Strings a) Write a C program to find the length of a given string. b) Write a C program to count the number of vowels in a given string and also print the vowels. c) White a C program to check how many alphabets and non alphabets are there in a string. d) Write a C program to remove blank spaces from a string. e) Write a C program to capitalize all the letters of a string. f) Write a C program that uses functions to perform the following

5 operations To insert a sub-string in to given main string from a given position. To delete n characters from a given position in given string. g) Write a C program to determine if the given string is a palindrome or not. h) Write a C program that displays the position or index in the string S where the string T begins or 1 if S does not contain T. i) Write a C program to count the lines, words and characters in a given text. j) Write a C program that deletes a word from a sentence. Note that the word may appear any number of times. k) Write a C program to find a string within a sentence and replace it with another string. l) Write a C program that takes the name of a person as input and prints the name in an abbreviated fashion, e.g. Ram Kumar as R. K. m) Write a C program that reads a line of text and counts all occurrence of a particular word. n) Write a C program to convert each character of a string into the next alphabet and print the string. 7 Structures and Unions a) Write a C program to copy one structure to another of same type. b) Write a C program that passes a pointer to a structure and returns nothing. c) Write a C program to define a structure named time, which contains three int members. d) Write a C program to create a structure containing 5 strings: address1, address2, city, state and zip. Create a typedef called record that can be used to create instances of this structure. e) Write a C program that uses functions to perform the following operations Reading a complex number Writing a complex number Addition of 2 complex numbers Multiplication of 2 complex numbers 8 Files a) Write a C program to copy the contents from one file to another. b) Write a C program to display the contents of a file on screen. c) Write a C program to count the number of characters and number of lines in a file. d) Write a C program that accepts the names of two files. It

6 should copy the first file into the second line by line. Use the fgets() and fputs() functions. e) Write a C program to delete a file using remove() function. f) Write a C program to rename the old file name to new file name using rename(). g) Write a C program to reverse the first n characters in a file. (Note: the file name and n are specified on the command line) h) Write a C program to find the no. of characters, no. of words, and number of lines in a given file.

I PUC - Computer Science. Practical s Syllabus. Contents

I PUC - Computer Science. Practical s Syllabus. Contents I PUC - Computer Science Practical s Syllabus Contents Topics 1 Overview Of a Computer 1.1 Introduction 1.2 Functional Components of a computer (Working of each unit) 1.3 Evolution Of Computers 1.4 Generations

More information

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier.

1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. Study Group 1 Variables and Types 1. Define: (a) Variable, (b) Constant, (c) Type, (d) Enumerated Type, (e) Identifier. 2. What does the byte 00100110 represent? 3. What is the purpose of the declarations

More information

ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology)

ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology) ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology) Subject Description: This subject deals with discrete structures like set theory, mathematical

More information

Pseudo code Tutorial and Exercises Teacher s Version

Pseudo code Tutorial and Exercises Teacher s Version Pseudo code Tutorial and Exercises Teacher s Version Pseudo-code is an informal way to express the design of a computer program or an algorithm in 1.45. The aim is to get the idea quickly and also easy

More information

B.Sc.(Computer Science) and. B.Sc.(IT) Effective From July 2011

B.Sc.(Computer Science) and. B.Sc.(IT) Effective From July 2011 NEW Detailed Syllabus of B.Sc.(Computer Science) and B.Sc.(IT) Effective From July 2011 SEMESTER SYSTEM Scheme & Syllabus for B.Sc. (CS) Pass and Hons. Course Effective from July 2011 and onwards CLASS

More information

9 Control Statements. 9.1 Introduction. 9.2 Objectives. 9.3 Statements

9 Control Statements. 9.1 Introduction. 9.2 Objectives. 9.3 Statements 9 Control Statements 9.1 Introduction The normal flow of execution in a high level language is sequential, i.e., each statement is executed in the order of its appearance in the program. However, depending

More information

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T) Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating

More information

MACM 101 Discrete Mathematics I

MACM 101 Discrete Mathematics I MACM 101 Discrete Mathematics I Exercises on Combinatorics, Probability, Languages and Integers. Due: Tuesday, November 2th (at the beginning of the class) Reminder: the work you submit must be your own.

More information

1 Classical Universal Computer 3

1 Classical Universal Computer 3 Chapter 6: Machine Language and Assembler Christian Jacob 1 Classical Universal Computer 3 1.1 Von Neumann Architecture 3 1.2 CPU and RAM 5 1.3 Arithmetic Logical Unit (ALU) 6 1.4 Arithmetic Logical Unit

More information

This is great when speed is important and relatively few words are necessary, but Max would be a terrible language for writing a text editor.

This is great when speed is important and relatively few words are necessary, but Max would be a terrible language for writing a text editor. Dealing With ASCII ASCII, of course, is the numeric representation of letters used in most computers. In ASCII, there is a number for each character in a message. Max does not use ACSII very much. In the

More information

PROBLEMS (Cap. 4 - Istruzioni macchina)

PROBLEMS (Cap. 4 - Istruzioni macchina) 98 CHAPTER 2 MACHINE INSTRUCTIONS AND PROGRAMS PROBLEMS (Cap. 4 - Istruzioni macchina) 2.1 Represent the decimal values 5, 2, 14, 10, 26, 19, 51, and 43, as signed, 7-bit numbers in the following binary

More information

Prentice Hall MyMathLab Algebra 1, 2011

Prentice Hall MyMathLab Algebra 1, 2011 Prentice Hall MyMathLab Algebra 1, 2011 C O R R E L A T E D T O Tennessee Mathematics Standards, 2009-2010 Implementation, Algebra I Tennessee Mathematics Standards 2009-2010 Implementation Algebra I 3102

More information

26 Integers: Multiplication, Division, and Order

26 Integers: Multiplication, Division, and Order 26 Integers: Multiplication, Division, and Order Integer multiplication and division are extensions of whole number multiplication and division. In multiplying and dividing integers, the one new issue

More information

3.1. RATIONAL EXPRESSIONS

3.1. RATIONAL EXPRESSIONS 3.1. RATIONAL EXPRESSIONS RATIONAL NUMBERS In previous courses you have learned how to operate (do addition, subtraction, multiplication, and division) on rational numbers (fractions). Rational numbers

More information

How do you compare numbers? On a number line, larger numbers are to the right and smaller numbers are to the left.

How do you compare numbers? On a number line, larger numbers are to the right and smaller numbers are to the left. The verbal answers to all of the following questions should be memorized before completion of pre-algebra. Answers that are not memorized will hinder your ability to succeed in algebra 1. Number Basics

More information

A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions

A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions Marcel B. Finan Arkansas Tech University c All Rights Reserved First Draft February 8, 2006 1 Contents 25

More information

Check Digits for Detecting Recording Errors in Horticultural Research: Theory and Examples

Check Digits for Detecting Recording Errors in Horticultural Research: Theory and Examples HORTSCIENCE 40(7):1956 1962. 2005. Check Digits for Detecting Recording Errors in Horticultural Research: Theory and Examples W.R. Okie U.S. Department of Agriculture, Agricultural Research Service, Southeastern

More information

NCPC 2013 Presentation of solutions

NCPC 2013 Presentation of solutions NCPC 2013 Presentation of solutions Head of Jury: Lukáš Poláček 2013-10-05 NCPC Jury authors Andreas Björklund (LTH) Jaap Eldering (Imperial) Daniel Espling (UMU) Christian Ledig (Imperial) Ulf Lundström

More information

Unit 6. Loop statements

Unit 6. Loop statements Unit 6 Loop statements Summary Repetition of statements The while statement Input loop Loop schemes The for statement The do statement Nested loops Flow control statements 6.1 Statements in Java Till now

More information

Fourth Grade Math Standards and "I Can Statements"

Fourth Grade Math Standards and I Can Statements Fourth Grade Math Standards and "I Can Statements" Standard - CC.4.OA.1 Interpret a multiplication equation as a comparison, e.g., interpret 35 = 5 x 7 as a statement that 35 is 5 times as many as 7 and

More information

Compilers Lexical Analysis

Compilers Lexical Analysis Compilers Lexical Analysis SITE : http://www.info.univ-tours.fr/ mirian/ TLC - Mírian Halfeld-Ferrari p. 1/3 The Role of the Lexical Analyzer The first phase of a compiler. Lexical analysis : process of

More information

Informatica e Sistemi in Tempo Reale

Informatica e Sistemi in Tempo Reale Informatica e Sistemi in Tempo Reale Introduction to C programming Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 25, 2010 G. Lipari (Scuola Superiore Sant Anna)

More information

Primes. Name Period Number Theory

Primes. Name Period Number Theory Primes Name Period A Prime Number is a whole number whose only factors are 1 and itself. To find all of the prime numbers between 1 and 100, complete the following exercise: 1. Cross out 1 by Shading in

More information

Polynomial Degree and Finite Differences

Polynomial Degree and Finite Differences CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson you will learn the terminology associated with polynomials use the finite differences method to determine the degree of a polynomial

More information

Mathematical Induction. Lecture 10-11

Mathematical Induction. Lecture 10-11 Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach

More information

Factoring Algorithms

Factoring Algorithms Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors

More information

Efficient Data Structures for Decision Diagrams

Efficient Data Structures for Decision Diagrams Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...

More information

A binary search tree or BST is a binary tree that is either empty or in which the data element of each node has a key, and:

A binary search tree or BST is a binary tree that is either empty or in which the data element of each node has a key, and: Binary Search Trees 1 The general binary tree shown in the previous chapter is not terribly useful in practice. The chief use of binary trees is for providing rapid access to data (indexing, if you will)

More information

Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any.

Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. Algebra 2 - Chapter Prerequisites Vocabulary Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. P1 p. 1 1. counting(natural) numbers - {1,2,3,4,...}

More information

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR COBOL PROGRAMMING CIS1866 3 Credit Hours Student Level: This course is open to students on the college level in either Freshman or

More information

SECTION C [short essay] [Not to exceed 120 words, Answer any SIX questions. Each question carries FOUR marks] 6 x 4=24 marks

SECTION C [short essay] [Not to exceed 120 words, Answer any SIX questions. Each question carries FOUR marks] 6 x 4=24 marks UNIVERSITY OF KERALA First Degree Programme in Computer Applications Model Question Paper Semester I Course Code- CP 1121 Introduction to Computer Science TIME : 3 hrs Maximum Mark: 80 SECTION A [Very

More information

Chapter 7: Additional Topics

Chapter 7: Additional Topics Chapter 7: Additional Topics In this chapter we ll briefly cover selected advanced topics in fortran programming. All the topics come in handy to add extra functionality to programs, but the feature you

More information

FOREWORD. Executive Secretary

FOREWORD. Executive Secretary FOREWORD The Botswana Examinations Council is pleased to authorise the publication of the revised assessment procedures for the Junior Certificate Examination programme. According to the Revised National

More information

Class Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433

Class Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 Class Notes CS 3137 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 1. FIXED LENGTH CODES: Codes are used to transmit characters over data links. You are probably aware of the ASCII code, a fixed-length

More information

Microsoft Excel Tips & Tricks

Microsoft Excel Tips & Tricks Microsoft Excel Tips & Tricks Collaborative Programs Research & Evaluation TABLE OF CONTENTS Introduction page 2 Useful Functions page 2 Getting Started with Formulas page 2 Nested Formulas page 3 Copying

More information

COURSE SYLLABUS -----------------------------------------------------------------------------------

COURSE SYLLABUS ----------------------------------------------------------------------------------- Last Reviewed by: Leslie Wurst Date Approved: Date Revised: Fall 2012 COURSE SYLLABUS Syllabus for: MATH 1010 Math for General Studies Former Course and Title: Former Quarter Course(s): Mat 1260 Contemporary

More information

Big Ideas in Mathematics

Big Ideas in Mathematics Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards

More information

Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks

Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks Welcome to Thinkwell s Homeschool Precalculus! We re thrilled that you ve decided to make us part of your homeschool curriculum. This lesson

More information

New Hash Function Construction for Textual and Geometric Data Retrieval

New Hash Function Construction for Textual and Geometric Data Retrieval Latest Trends on Computers, Vol., pp.483-489, ISBN 978-96-474-3-4, ISSN 79-45, CSCC conference, Corfu, Greece, New Hash Function Construction for Textual and Geometric Data Retrieval Václav Skala, Jan

More information

Lexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016

Lexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016 Master s Degree Course in Computer Engineering Formal Languages FORMAL LANGUAGES AND COMPILERS Lexical analysis Floriano Scioscia 1 Introductive terminological distinction Lexical string or lexeme = meaningful

More information

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters

ASCII Encoding. The char Type. Manipulating Characters. Manipulating Characters The char Type ASCII Encoding The C char type stores small integers. It is usually 8 bits. char variables guaranteed to be able to hold integers 0.. +127. char variables mostly used to store characters

More information

47 Numerator Denominator

47 Numerator Denominator JH WEEKLIES ISSUE #22 2012-2013 Mathematics Fractions Mathematicians often have to deal with numbers that are not whole numbers (1, 2, 3 etc.). The preferred way to represent these partial numbers (rational

More information

Review of Hashing: Integer Keys

Review of Hashing: Integer Keys CSE 326 Lecture 13: Much ado about Hashing Today s munchies to munch on: Review of Hashing Collision Resolution by: Separate Chaining Open Addressing $ Linear/Quadratic Probing $ Double Hashing Rehashing

More information

Microsoft Excel 2010 Tutorial

Microsoft Excel 2010 Tutorial 1 Microsoft Excel 2010 Tutorial Excel is a spreadsheet program in the Microsoft Office system. You can use Excel to create and format workbooks (a collection of spreadsheets) in order to analyze data and

More information

Python Lists and Loops

Python Lists and Loops WEEK THREE Python Lists and Loops You ve made it to Week 3, well done! Most programs need to keep track of a list (or collection) of things (e.g. names) at one time or another, and this week we ll show

More information

Algebra 1 Course Title

Algebra 1 Course Title Algebra 1 Course Title Course- wide 1. What patterns and methods are being used? Course- wide 1. Students will be adept at solving and graphing linear and quadratic equations 2. Students will be adept

More information

Chapter 1. Computation theory

Chapter 1. Computation theory Chapter 1. Computation theory In this chapter we will describe computation logic for the machines. This topic is a wide interdisciplinary field, so that the students can work in an interdisciplinary context.

More information

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to: Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how

More information

Automata and Formal Languages

Automata and Formal Languages Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,

More information

Useful Microsoft Excel Functions & Formulas Theresa A Scott, MS Department of Biostatistics Vanderbilt University theresa.scott@vanderbilt.

Useful Microsoft Excel Functions & Formulas Theresa A Scott, MS Department of Biostatistics Vanderbilt University theresa.scott@vanderbilt. Useful Microsoft Excel Functions & s Theresa Scott, MS Department of Biostatistics Vanderbilt University theresa.scott@vanderbilt.edu This document contains a series of examples that illustrate some useful

More information

10.1. Solving Quadratic Equations. Investigation: Rocket Science CONDENSED

10.1. Solving Quadratic Equations. Investigation: Rocket Science CONDENSED CONDENSED L E S S O N 10.1 Solving Quadratic Equations In this lesson you will look at quadratic functions that model projectile motion use tables and graphs to approimate solutions to quadratic equations

More information

Curriculum Map. Discipline: Computer Science Course: C++

Curriculum Map. Discipline: Computer Science Course: C++ Curriculum Map Discipline: Computer Science Course: C++ August/September: How can computer programs make problem solving easier and more efficient? In what order does a computer execute the lines of code

More information

Factoring Algorithms

Factoring Algorithms Institutionen för Informationsteknologi Lunds Tekniska Högskola Department of Information Technology Lund University Cryptology - Project 1 Factoring Algorithms The purpose of this project is to understand

More information

Loading Data into salesforce.com

Loading Data into salesforce.com Overview Data can be uploaded into salesforce.com from Excel using the sforce connector, an open source plugin for excel, available here: http://sforce.sourceforge.net/excel/downloads.htm This plug-in

More information

An Introduction to Number Theory Prime Numbers and Their Applications.

An Introduction to Number Theory Prime Numbers and Their Applications. East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations 8-2006 An Introduction to Number Theory Prime Numbers and Their Applications. Crystal

More information

Programming Exercises

Programming Exercises s CMPS 5P (Professor Theresa Migler-VonDollen ): Assignment #8 Problem 6 Problem 1 Programming Exercises Modify the recursive Fibonacci program given in the chapter so that it prints tracing information.

More information

GRID SEARCHING Novel way of Searching 2D Array

GRID SEARCHING Novel way of Searching 2D Array GRID SEARCHING Novel way of Searching 2D Array Rehan Guha Institute of Engineering & Management Kolkata, India Abstract: Linear/Sequential searching is the basic search algorithm used in data structures.

More information

Automata and Computability. Solutions to Exercises

Automata and Computability. Solutions to Exercises Automata and Computability Solutions to Exercises Fall 25 Alexis Maciel Department of Computer Science Clarkson University Copyright c 25 Alexis Maciel ii Contents Preface vii Introduction 2 Finite Automata

More information

High-Level Programming Languages. Nell Dale & John Lewis (adaptation by Michael Goldwasser)

High-Level Programming Languages. Nell Dale & John Lewis (adaptation by Michael Goldwasser) High-Level Programming Languages Nell Dale & John Lewis (adaptation by Michael Goldwasser) Low-Level Languages What are disadvantages of low-level languages? (e.g., machine code or assembly code) Programming

More information

Patterns in Pascal s Triangle

Patterns in Pascal s Triangle Pascal s Triangle Pascal s Triangle is an infinite triangular array of numbers beginning with a at the top. Pascal s Triangle can be constructed starting with just the on the top by following one easy

More information

The use of binary codes to represent characters

The use of binary codes to represent characters The use of binary codes to represent characters Teacher s Notes Lesson Plan x Length 60 mins Specification Link 2.1.4/hi Character Learning objective (a) Explain the use of binary codes to represent characters

More information

The following themes form the major topics of this chapter: The terms and concepts related to trees (Section 5.2).

The following themes form the major topics of this chapter: The terms and concepts related to trees (Section 5.2). CHAPTER 5 The Tree Data Model There are many situations in which information has a hierarchical or nested structure like that found in family trees or organization charts. The abstraction that models hierarchical

More information

1.6 The Order of Operations

1.6 The Order of Operations 1.6 The Order of Operations Contents: Operations Grouping Symbols The Order of Operations Exponents and Negative Numbers Negative Square Roots Square Root of a Negative Number Order of Operations and Negative

More information

Grade 4 - Module 5: Fraction Equivalence, Ordering, and Operations

Grade 4 - Module 5: Fraction Equivalence, Ordering, and Operations Grade 4 - Module 5: Fraction Equivalence, Ordering, and Operations Benchmark (standard or reference point by which something is measured) Common denominator (when two or more fractions have the same denominator)

More information

KEANSBURG SCHOOL DISTRICT KEANSBURG HIGH SCHOOL Mathematics Department. HSPA 10 Curriculum. September 2007

KEANSBURG SCHOOL DISTRICT KEANSBURG HIGH SCHOOL Mathematics Department. HSPA 10 Curriculum. September 2007 KEANSBURG HIGH SCHOOL Mathematics Department HSPA 10 Curriculum September 2007 Written by: Karen Egan Mathematics Supervisor: Ann Gagliardi 7 days Sample and Display Data (Chapter 1 pp. 4-47) Surveys and

More information

20 CODE CHALLENGES. GCSE (9 1) Computer Science GCSE REFORM. February 2015

20 CODE CHALLENGES. GCSE (9 1) Computer Science GCSE REFORM. February 2015 February 2015 GCSE (9 1) Computer Science GCSE REFORM We will inform centres about any changes to the specification. We will also publish changes on our website. The latest version of our specification

More information

FX 115 MS Training guide. FX 115 MS Calculator. Applicable activities. Quick Reference Guide (inside the calculator cover)

FX 115 MS Training guide. FX 115 MS Calculator. Applicable activities. Quick Reference Guide (inside the calculator cover) Tools FX 115 MS Calculator Handouts Other materials Applicable activities Quick Reference Guide (inside the calculator cover) Key Points/ Overview Advanced scientific calculator Two line display VPAM to

More information

DesCartes (Combined) Subject: Mathematics Goal: Statistics and Probability

DesCartes (Combined) Subject: Mathematics Goal: Statistics and Probability DesCartes (Combined) Subject: Mathematics Goal: Statistics and Probability RIT Score Range: Below 171 Below 171 Data Analysis and Statistics Solves simple problems based on data from tables* Compares

More information

http://www.aleks.com Access Code: RVAE4-EGKVN Financial Aid Code: 6A9DB-DEE3B-74F51-57304

http://www.aleks.com Access Code: RVAE4-EGKVN Financial Aid Code: 6A9DB-DEE3B-74F51-57304 MATH 1340.04 College Algebra Location: MAGC 2.202 Meeting day(s): TR 7:45a 9:00a, Instructor Information Name: Virgil Pierce Email: piercevu@utpa.edu Phone: 665.3535 Teaching Assistant Name: Indalecio

More information

Integer Factorization using the Quadratic Sieve

Integer Factorization using the Quadratic Sieve Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 seib0060@morris.umn.edu March 16, 2011 Abstract We give

More information

12 File and Database Concepts 13 File and Database Concepts A many-to-many relationship means that one record in a particular record type can be relat

12 File and Database Concepts 13 File and Database Concepts A many-to-many relationship means that one record in a particular record type can be relat 1 Databases 2 File and Database Concepts A database is a collection of information Databases are typically stored as computer files A structured file is similar to a card file or Rolodex because it uses

More information

Common Core State Standards for Mathematics Accelerated 7th Grade

Common Core State Standards for Mathematics Accelerated 7th Grade A Correlation of 2013 To the to the Introduction This document demonstrates how Mathematics Accelerated Grade 7, 2013, meets the. Correlation references are to the pages within the Student Edition. Meeting

More information

3 length + 23 size = 2

3 length + 23 size = 2 This pledged exam is closed textbook, open class web site, and two pieces of paper with notes. You may not access any other code or websites including your own. Write your email id and name on every page

More information

SAT Subject Math Level 2 Facts & Formulas

SAT Subject Math Level 2 Facts & Formulas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reals: integers plus fractions, decimals, and irrationals ( 2, 3, π, etc.) Order Of Operations: Arithmetic Sequences: PEMDAS (Parentheses

More information

DOEACC SOCIETY DOEACC O LEVEL COURSE DURATION OF THE COURSE PRACTICAL PROJECT

DOEACC SOCIETY DOEACC O LEVEL COURSE DURATION OF THE COURSE PRACTICAL PROJECT DOEACC SOCIETY DOEACC Society is an autonomous scientific society of the Department of Information Technology, Ministry of Communications & Information Technology, and Govt. of India. The Society is registered

More information

Illinois State Standards Alignments Grades Three through Eleven

Illinois State Standards Alignments Grades Three through Eleven Illinois State Standards Alignments Grades Three through Eleven Trademark of Renaissance Learning, Inc., and its subsidiaries, registered, common law, or pending registration in the United States and other

More information

Factoring and Applications

Factoring and Applications Factoring and Applications What is a factor? The Greatest Common Factor (GCF) To factor a number means to write it as a product (multiplication). Therefore, in the problem 48 3, 4 and 8 are called the

More information

Chapter Objectives. Chapter 9. Sequential Search. Search Algorithms. Search Algorithms. Binary Search

Chapter Objectives. Chapter 9. Sequential Search. Search Algorithms. Search Algorithms. Binary Search Chapter Objectives Chapter 9 Search Algorithms Data Structures Using C++ 1 Learn the various search algorithms Explore how to implement the sequential and binary search algorithms Discover how the sequential

More information

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important

More information

Manitoba Curriculum. Alignment with Mathletics. Supported by independent evidence-based research and practice. Powerful reporting.

Manitoba Curriculum. Alignment with Mathletics. Supported by independent evidence-based research and practice. Powerful reporting. Supported by independent evidence-based research practice. Follows provincial curricula Powerful reporting Student centred Content Kindergarten Grade 1 Grade 2 02 04 08 Grade 10 Applied & Pre-Calculus

More information

SQUARE-SQUARE ROOT AND CUBE-CUBE ROOT

SQUARE-SQUARE ROOT AND CUBE-CUBE ROOT UNIT 3 SQUAREQUARE AND CUBEUBE (A) Main Concepts and Results A natural number is called a perfect square if it is the square of some natural number. i.e., if m = n 2, then m is a perfect square where m

More information

Prentice Hall Connected Mathematics 2, 7th Grade Units 2009

Prentice Hall Connected Mathematics 2, 7th Grade Units 2009 Prentice Hall Connected Mathematics 2, 7th Grade Units 2009 Grade 7 C O R R E L A T E D T O from March 2009 Grade 7 Problem Solving Build new mathematical knowledge through problem solving. Solve problems

More information

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this

More information

A single register, called the accumulator, stores the. operand before the operation, and stores the result. Add y # add y from memory to the acc

A single register, called the accumulator, stores the. operand before the operation, and stores the result. Add y # add y from memory to the acc Other architectures Example. Accumulator-based machines A single register, called the accumulator, stores the operand before the operation, and stores the result after the operation. Load x # into acc

More information

UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming

UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming UIL Computer Science for Dummies by Jake Warren and works from Mr. Fleming 1 2 Foreword First of all, this book isn t really for dummies. I wrote it for myself and other kids who are on the team. Everything

More information

CGN 3421 - Computer Methods

CGN 3421 - Computer Methods CGN 3421 - Computer Methods Class web site: www.ce.ufl.edu/~kgurl Class text books: Recommended as a reference Numerical Methods for Engineers, Chapra and Canale Fourth Edition, McGraw-Hill Class software:

More information

MACHINE INSTRUCTIONS AND PROGRAMS

MACHINE INSTRUCTIONS AND PROGRAMS CHAPTER 2 MACHINE INSTRUCTIONS AND PROGRAMS CHAPTER OBJECTIVES In this chapter you will learn about: Machine instructions and program execution, including branching and subroutine call and return operations

More information

AFF 808. Sub. Code 4BIT1C1. B.Sc. DEGREE EXAMINATION, NOVEMBER 2015. First Semester. Information Technology

AFF 808. Sub. Code 4BIT1C1. B.Sc. DEGREE EXAMINATION, NOVEMBER 2015. First Semester. Information Technology Ws4 AFF 808 Sub. Code 4BITC B.Sc. DEGREE EXAMINATION, NOVEMBER 05 First Semester Information Technology PRINCIPLES OF INFORMATION TECHNOLOGY AND OS (CBCS 04 onwards) Time : 3 Hours Maximum : 75 Marks Part

More information

HIBBING COMMUNITY COLLEGE COURSE OUTLINE

HIBBING COMMUNITY COLLEGE COURSE OUTLINE HIBBING COMMUNITY COLLEGE COURSE OUTLINE COURSE NUMBER & TITLE: - Beginning Algebra CREDITS: 4 (Lec 4 / Lab 0) PREREQUISITES: MATH 0920: Fundamental Mathematics with a grade of C or better, Placement Exam,

More information

grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print

grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print In the simplest terms, grep (global regular expression print) will search input

More information

GRADES 7, 8, AND 9 BIG IDEAS

GRADES 7, 8, AND 9 BIG IDEAS Table 1: Strand A: BIG IDEAS: MATH: NUMBER Introduce perfect squares, square roots, and all applications Introduce rational numbers (positive and negative) Introduce the meaning of negative exponents for

More information

Vector storage and access; algorithms in GIS. This is lecture 6

Vector storage and access; algorithms in GIS. This is lecture 6 Vector storage and access; algorithms in GIS This is lecture 6 Vector data storage and access Vectors are built from points, line and areas. (x,y) Surface: (x,y,z) Vector data access Access to vector

More information

What are the place values to the left of the decimal point and their associated powers of ten?

What are the place values to the left of the decimal point and their associated powers of ten? The verbal answers to all of the following questions should be memorized before completion of algebra. Answers that are not memorized will hinder your ability to succeed in geometry and algebra. (Everything

More information

Conditionals (with solutions)

Conditionals (with solutions) Conditionals (with solutions) For exercises 1 to 27, indicate the output that will be produced. Assume the following declarations: final int MAX = 25, LIMIT = 100; int num1 = 12, num2 = 25, num3 = 87;

More information

Do not open this examination paper until instructed to do so. Section A: answer all the questions. Section B: answer all the questions.

Do not open this examination paper until instructed to do so. Section A: answer all the questions. Section B: answer all the questions. N10/5/COMSC/HP1/ENG/TZ0/XX 88107011 Computer science HIGHER level Paper 1 Tuesday 16 November 2010 (afternoon) 2 hours 15 minutes INSTRUCTIONS TO CANDIDATES Do not open this examination paper until instructed

More information

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)

More information

Computer and Network Security

Computer and Network Security MIT 6.857 Computer and Networ Security Class Notes 1 File: http://theory.lcs.mit.edu/ rivest/notes/notes.pdf Revision: December 2, 2002 Computer and Networ Security MIT 6.857 Class Notes by Ronald L. Rivest

More information

Example of a Java program

Example of a Java program Example of a Java program class SomeNumbers static int square (int x) return x*x; public static void main (String[] args) int n=20; if (args.length > 0) // change default n = Integer.parseInt(args[0]);

More information