Propedéutico de Programación

Size: px
Start display at page:

Download "Propedéutico de Programación"

Transcription

1 Propedéutico de Programación Coordinación de Ciencias Computacionales 9/13 Material preparado por: Dra. Pilar Gómez Gil

2 Chapter 4 ADT Sorted List

3 ADT Sorted List Remember the difference between an unsorted list and a sorted list? Remember the definition of a key? If the list is a sorted list of names, what would be the key? of bank balances, what would be the key? of grades, what would be the key?

4 ADT Unsorted List Operations Transformers MakeEmpty InsertItem DeleteItem Observers IsFull GetLength RetrieveItem Iterators ResetList GetNextItem change state observe state process all

5 ADT Sorted List Which member function specifications and implementations must change to ensure that any instance of the Sorted List ADT remains sorted at all times? InsertItem DeleteItem

6 La inserción tendrá que ser de tal manera que la lista siempre se mantenga ordenada

7 Linked Implementation What about passing spot where item would be if there?

8 Linked Implementation Is Inserting as easy? Let's see Set location to listdata Set moretosearch to (location!= NULL) while moretosearch switch (item.comparedto(location->info)) case GREATER : Set location to location->next Set moretosearch to (location!= NULL) case LESS : Set moretosearch to false See the problem?

9 Linked Implementation We need a trailing pointer

10 Inserting S into a Sorted List predloc location Private data: length 3 listdata C L X currentpos? moretosearch

11 Finding proper position for S predloc NULL location Private data: length 3 listdata C L X currentpos? moretosearch true

12 Finding proper position for S predloc location Private data: length 3 listdata C L X currentpos? moretosearch true

13 Finding Proper Position for S predloc location Private data: length 3 listdata C L X currentpos? moretosearch false

14 Inserting S into Proper Position predloc location Private data: length 4 listdata C L X currentpos moretosearch false S

15 Ver sorted.h Ver sorted.cpp

16 Linked Implementation Does DeleteItem have to be changed?

17 Object-Oriented Design Methodology Object-oriented design decomposes a problem into classes Four stages to the decomposition process Brainstorming Filtering Scenarios Responsibility algorithms

18 Object-Oriented Design Methodology Brainstorming A group problem-solving technique that involves the spontaneous contribution of ideas from all members of the group All ideas are potential good ideas Think fast and furiously first, and ponder later A little humor can be a powerful force Brainstorming is designed to produce a list of candidate classes

19 Object-Oriented Design Methodology Filtering Determine which are the core classes in the problem solution There may be two classes in the list that have many common attributes and behaviors There may be classes that really don t belong in the problem solution

20 Object-Oriented Design Methodology Scenarios Sequences of steps that describe an interaction between a client and an application or program Simulate class interactions Ask What if? questions Assign responsibilities to each class There are two types of responsibilities What a class must know about itself (knowledge) What a class must be able to do (behavior) Use case A collection of scenarios related to a common goal

21 Object-Oriented Design Methodology Role playing

22 Object-Oriented Design Methodology Responsibility Algorithms The algorithms must be written for the responsibilities Knowledge responsibilities usually just return the contents of one of an object s variables Action responsibilities are a little more complicated, often involving calculations Responsibilities algorithms are often decomposed using top-down design

23 Relationships Between Classes Containment part-of An address class may be part of the definition of a student class Inheritance Classes can inherit data and behavior from other classes is-a

24 Computer Example Let s work through this problem-solving process by creating an address list Brainstorming and filtering Circling the nouns and underlining the verbs is a good way to begin

25 Computer Example First pass at a list of classes list name telephone number address list order names list scraps paper cards Filtered List list, name, telephone number, address

26 CRC Cards Can you think of any other useful responsibilities?

27 CRC Cards Can you think of any other useful responsibilities?

28 CRC Cards How is this class different from Name and Person?

29 Responsibility Algorithms Person Class Initialize name.initialize() Write "Enter phone number; press return." Get telephone number Write "Enter address; press return." Get address Print Tells name to initialize itself Tells name to print itself name.print() Write "Telephone number: " + telephonenumber Write " address: " + address

30 Responsibility Algorithms Name Class Initialize "Enter the first name; press return." Read firstname "Enter the last name; press return." Read lastname Print Print "First name: " + firstname Print "Last name: " + lastname

Propedéutico de Programación

Propedéutico de Programación Propedéutico de Programación Coordinación de Ciencias Computacionales 4/12 Material preparado por: Dra. Pilar Gómez Gil Chapter 14 Object-Oriented Software Development (continuación) Dale/Weems Constructor

More information

P R O C E S S O L I C I T A T Ó R I O n º. 0 033/ 2013. E D I T A L D E P R E G Ã O P R E S E N C I A L n º. 0010/ 2 0 1 3

P R O C E S S O L I C I T A T Ó R I O n º. 0 033/ 2013. E D I T A L D E P R E G Ã O P R E S E N C I A L n º. 0010/ 2 0 1 3 P R O C E S S O L I C I T A T Ó R I O n º. 0 033/ 2013 E D I T A L D E P R E G Ã O P R E S E N C I A L n º. 0010/ 2 0 1 3 1 P R E Â M B U L O 1. 1 O M u n i c í p i o d e L a j e a d o G r a n d e / S

More information

Announcements. HW due today, 2 to grade this week Welcome back from Spring Break!

Announcements. HW due today, 2 to grade this week Welcome back from Spring Break! Announcements HW due today, 2 to grade this week Welcome back from Spring Break! Analysis (Domain) Modeling: Introduction Reading: Arlow and Neustadt chaps. 8, 9 (& 7) Also see Larman Chapter 10 (2 nd

More information

Curriculum Map. Discipline: Computer Science Course: C++

Curriculum Map. Discipline: Computer Science Course: C++ Curriculum Map Discipline: Computer Science Course: C++ August/September: How can computer programs make problem solving easier and more efficient? In what order does a computer execute the lines of code

More information

Software Development: An Introduction

Software Development: An Introduction Software Development: An Introduction Fact: Software is hard. Imagine the difficulty of producing Windows 2000 29 million lines of code 480,000 pages of listing if printed a stack of paper 161 feet high

More information

Data Structures Using C++ 2E. Chapter 5 Linked Lists

Data Structures Using C++ 2E. Chapter 5 Linked Lists Data Structures Using C++ 2E Chapter 5 Linked Lists Test #1 Next Thursday During Class Cover through (near?) end of Chapter 5 Objectives Learn about linked lists Become aware of the basic properties of

More information

Topic # 08. Structuring System Process Requirements. CIS Life Cycle and Requirements Structuring Stage

Topic # 08. Structuring System Process Requirements. CIS Life Cycle and Requirements Structuring Stage Topic # 08 Structuring System Process Requirements CIS Life Cycle and Requirements Structuring Stage Objectives 1. Data Flow Diagrams 2. Rules and Guidelines to DFD development that lead to accurate and

More information

Warm-Up. Today s Objective/Standards: Students will use the correct order of operations to evaluate algebraic expressions/ Gr. 6 AF 1.

Warm-Up. Today s Objective/Standards: Students will use the correct order of operations to evaluate algebraic expressions/ Gr. 6 AF 1. Warm-Up CST/CAHSEE: Gr. 6 AF 1.4 Simplify: 8 + 8 2 + 2 A) 4 B) 8 C) 10 D) 14 Review: Gr. 7 NS 1.2 Complete the statement using ,. Explain. 2 5 5 2 How did students get the other answers? Other: Gr.

More information

Data Flow Diagrams. Outline. Some Rules for External Entities 1/25/2010. Mechanics

Data Flow Diagrams. Outline. Some Rules for External Entities 1/25/2010. Mechanics Data Flow Diagrams Mechanics Outline DFD symbols External entities (sources and sinks) Data Stores Data Flows Processes Types of diagrams Step by step approach Rules Some Rules for External Entities External

More information

Binary Heap Algorithms

Binary Heap Algorithms CS Data Structures and Algorithms Lecture Slides Wednesday, April 5, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks CHAPPELLG@member.ams.org 2005 2009 Glenn G. Chappell

More information

ATM Case Study Part 1

ATM Case Study Part 1 ATM Case Study Part 1 A requirements document specifies the purpose of the ATM system and what it must do. Requirements Document A local bank intends to install a new automated teller machine (ATM) to

More information

DATA STRUCTURE - STACK

DATA STRUCTURE - STACK DATA STRUCTURE - STACK http://www.tutorialspoint.com/data_structures_algorithms/stack_algorithm.htm Copyright tutorialspoint.com A stack is an abstract data type ADT, commonly used in most programming

More information

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A

More information

RELATIONAL DATABASE DESIGN

RELATIONAL DATABASE DESIGN RELATIONAL DATABASE DESIGN g Good database design - Avoiding anomalies g Functional Dependencies g Normalization & Decomposition Using Functional Dependencies g 1NF - Atomic Domains and First Normal Form

More information

Object-Oriented Design

Object-Oriented Design Object-Oriented Design Lecturer: Raman Ramsin Lecture 7: Finding Analysis Classes 1 Analysis Workflow: Analyze a Use Case The analysis workflow consists of the following activities: Architectural analysis

More information

Once the schema has been designed, it can be implemented in the RDBMS.

Once the schema has been designed, it can be implemented in the RDBMS. 2. Creating a database Designing the database schema... 1 Representing Classes, Attributes and Objects... 2 Data types... 5 Additional constraints... 6 Choosing the right fields... 7 Implementing a table

More information

The first program: Little Crab

The first program: Little Crab CHAPTER 2 The first program: Little Crab topics: concepts: writing code: movement, turning, reacting to the screen edges source code, method call, parameter, sequence, if-statement In the previous chapter,

More information

Design and UML Class Diagrams

Design and UML Class Diagrams Design and UML Class Diagrams 1 Suggested reading: Practical UML: A hands on introduction for developers http://dn.codegear.com/article/31863 UML DistilledCh. 3, by M. Fowler How do people draw / write

More information

CompSci-61B, Data Structures Final Exam

CompSci-61B, Data Structures Final Exam Your Name: CompSci-61B, Data Structures Final Exam Your 8-digit Student ID: Your CS61B Class Account Login: This is a final test for mastery of the material covered in our labs, lectures, and readings.

More information

2 The first program: Little Crab

2 The first program: Little Crab 2 The first program: Little Crab topics: concepts: writing code: movement, turning, reacting to the screen edges source code, method call, parameter, sequence, if statement In the previous chapter, we

More information

recursion, O(n), linked lists 6/14

recursion, O(n), linked lists 6/14 recursion, O(n), linked lists 6/14 recursion reducing the amount of data to process and processing a smaller amount of data example: process one item in a list, recursively process the rest of the list

More information

Some programming experience in a high-level structured programming language is recommended.

Some programming experience in a high-level structured programming language is recommended. Python Programming Course Description This course is an introduction to the Python programming language. Programming techniques covered by this course include modularity, abstraction, top-down design,

More information

Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science. Unit of Study / Textbook Correlation

Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science. Unit of Study / Textbook Correlation Thomas Jefferson High School for Science and Technology Program of Studies Foundations of Computer Science updated 03/08/2012 Unit 1: JKarel 8 weeks http://www.fcps.edu/is/pos/documents/hs/compsci.htm

More information

User Manual. for the. Database Normalizer. application. Elmar Jürgens 2002-2004 juergens@in.tum.de

User Manual. for the. Database Normalizer. application. Elmar Jürgens 2002-2004 juergens@in.tum.de User Manual for the Database Normalizer application Elmar Jürgens 2002-2004 juergens@in.tum.de Introduction 1 Purpose of this document 1 Concepts 1 Explanation of the User Interface 2 Overview 2 All Relations

More information

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92. Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure

More information

Abstract Data Type. EECS 281: Data Structures and Algorithms. The Foundation: Data Structures and Abstract Data Types

Abstract Data Type. EECS 281: Data Structures and Algorithms. The Foundation: Data Structures and Abstract Data Types EECS 281: Data Structures and Algorithms The Foundation: Data Structures and Abstract Data Types Computer science is the science of abstraction. Abstract Data Type Abstraction of a data structure on that

More information

Unordered Linked Lists

Unordered Linked Lists Unordered Linked Lists Derive class unorderedlinkedlist from the abstract class linkedlisttype Implement the operations search, insertfirst, insertlast, deletenode See code on page 292 Defines an unordered

More information

CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions

CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions CS 2112 Spring 2014 Assignment 3 Data Structures and Web Filtering Due: March 4, 2014 11:59 PM Implementing spam blacklists and web filters requires matching candidate domain names and URLs very rapidly

More information

Object-oriented design methodologies

Object-oriented design methodologies Object-oriented design methodologies An object-oriented methodology is defined as the system of principles and procedures applied to object-oriented software development. Five years ago, there was no standard

More information

Ordered Lists and Binary Trees

Ordered Lists and Binary Trees Data Structures and Algorithms Ordered Lists and Binary Trees Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/62 6-0:

More information

Principles of Software Construction: Objects, Design, and Concurrency. Domain Modeling and Specifying System Behavior. toad

Principles of Software Construction: Objects, Design, and Concurrency. Domain Modeling and Specifying System Behavior. toad Principles of Software Construction: Objects, Design, and Concurrency Domain Modeling and Specifying System Behavior toad Fall 2014 Jonathan Aldrich Charlie Garrod School of Computer Science Administrivia:

More information

Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18

Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Unit objective and aim(s): This unit aims to give learners a

More information

p-values and significance levels (false positive or false alarm rates)

p-values and significance levels (false positive or false alarm rates) p-values and significance levels (false positive or false alarm rates) Let's say 123 people in the class toss a coin. Call it "Coin A." There are 65 heads. Then they toss another coin. Call it "Coin B."

More information

APP INVENTOR. Test Review

APP INVENTOR. Test Review APP INVENTOR Test Review Main Concepts App Inventor Lists Creating Random Numbers Variables Searching and Sorting Data Linear Search Binary Search Selection Sort Quick Sort Abstraction Modulus Division

More information

The ADT Binary Search Tree

The ADT Binary Search Tree The ADT Binary Search Tree The Binary Search Tree is a particular type of binary tree that enables easy searching for specific items. Definition The ADT Binary Search Tree is a binary tree which has an

More information

CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards

CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards CompuScholar, Inc. Alignment to Utah's Computer Programming II Standards Course Title: TeenCoder: Java Programming Course ISBN: 978 0 9887070 2 3 Course Year: 2015 Note: Citation(s) listed may represent

More information

Chapter 7: Relational Database Design

Chapter 7: Relational Database Design Chapter 7: Relational Database Design Pitfalls in Relational Database Design Decomposition Normalization Using Functional Dependencies Normalization Using Multivalued Dependencies Normalization Using Join

More information

Chapter 2: Entity-Relationship Model. E-R R Diagrams

Chapter 2: Entity-Relationship Model. E-R R Diagrams Chapter 2: Entity-Relationship Model What s the use of the E-R model? Entity Sets Relationship Sets Design Issues Mapping Constraints Keys E-R Diagram Extended E-R Features Design of an E-R Database Schema

More information

Object-Oriented Design Guidelines

Object-Oriented Design Guidelines Adaptive Software Engineering G22.3033-007 Session 8 Sub-Topic 3 Presentation Object-Oriented Design Guidelines Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute

More information

Why you shouldn't use set (and what you should use instead) Matt Austern

Why you shouldn't use set (and what you should use instead) Matt Austern Why you shouldn't use set (and what you should use instead) Matt Austern Everything in the standard C++ library is there for a reason, but it isn't always obvious what that reason is. The standard isn't

More information

Case studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design

Case studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design I. Automated Banking System Case studies: Outline Requirements Engineering: OO and incremental software development 1. case study: withdraw money a. use cases b. identifying class/object (class diagram)

More information

Node-Based Structures Linked Lists: Implementation

Node-Based Structures Linked Lists: Implementation Linked Lists: Implementation CS 311 Data Structures and Algorithms Lecture Slides Monday, March 30, 2009 Glenn G. Chappell Department of Computer Science University of Alaska Fairbanks CHAPPELLG@member.ams.org

More information

Microsoft Access 3: Understanding and Creating Queries

Microsoft Access 3: Understanding and Creating Queries Microsoft Access 3: Understanding and Creating Queries In Access Level 2, we learned how to perform basic data retrievals by using Search & Replace functions and Sort & Filter functions. For more complex

More information

Analysis of a Search Algorithm

Analysis of a Search Algorithm CSE 326 Lecture 4: Lists and Stacks 1. Agfgd 2. Dgsdsfd 3. Hdffdsf 4. Sdfgsfdg 5. Tefsdgass We will review: Analysis: Searching a sorted array (from last time) List ADT: Insert, Delete, Find, First, Kth,

More information

El Dorado Union High School District Educational Services

El Dorado Union High School District Educational Services El Dorado Union High School District Course of Study Information Page Course Title: ACE Computer Programming II (#495) Rationale: A continuum of courses, including advanced classes in technology is needed.

More information

Beginning Microsoft Access

Beginning Microsoft Access Beginning Microsoft Access A database is a collection of information. Common collections of information that can be entered into a database include the library card catalog, a recipe box, or your personal

More information

A basic create statement for a simple student table would look like the following.

A basic create statement for a simple student table would look like the following. Creating Tables A basic create statement for a simple student table would look like the following. create table Student (SID varchar(10), FirstName varchar(30), LastName varchar(30), EmailAddress varchar(30));

More information

Database Design Methodology

Database Design Methodology Database Design Methodology Three phases Database Design Methodology Logical database Physical database Constructing a model of the information used in an enterprise on a specific data model but independent

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

Introduction to Object-Oriented Programming

Introduction to Object-Oriented Programming Introduction to Object-Oriented Programming Objects and classes Abstract Data Types (ADT) Encapsulation and information hiding Aggregation Inheritance and polymorphism OOP: Introduction 1 Pure Object-Oriented

More information

Announcements. SQL is hot! Facebook. Goal. Database Design Process. IT420: Database Management and Organization. Normalization (Chapter 3)

Announcements. SQL is hot! Facebook. Goal. Database Design Process. IT420: Database Management and Organization. Normalization (Chapter 3) Announcements IT0: Database Management and Organization Normalization (Chapter 3) Department coin design contest deadline - February -week exam Monday, February 1 Lab SQL SQL Server: ALTER TABLE tname

More information

Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers

Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers Why are Business Process Models often too complex? Do s and Don ts for Business Process Modelers Version 1.0 This document developed by Dr. Juergen Pitschke, BCS-Dr. Juergen Pitschke, www.enterprise-design.eu

More information

CSE 308. Coding Conventions. Reference

CSE 308. Coding Conventions. Reference CSE 308 Coding Conventions Reference Java Coding Conventions googlestyleguide.googlecode.com/svn/trunk/javaguide.html Java Naming Conventions www.ibm.com/developerworks/library/ws-tipnamingconv.html 2

More information

PROBLEM SOLVING SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON

PROBLEM SOLVING SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON PROBLEM SOLVING WITH SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON Addison Wesley Boston San Francisco New York London

More information

Conceptual Design: Entity Relationship Models. Objectives. Overview

Conceptual Design: Entity Relationship Models. Objectives. Overview Conceptual Design: Entity Relationship Models Craig Van Slyke, University of Central Florida cvanslyke@bus.ucf.edu John Day, Ohio University Objectives Define terms related to entity relationship modeling,

More information

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs. CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express

More information

Recognizing PL/SQL Lexical Units. Copyright 2007, Oracle. All rights reserved.

Recognizing PL/SQL Lexical Units. Copyright 2007, Oracle. All rights reserved. What Will I Learn? In this lesson, you will learn to: List and define the different types of lexical units available in PL/SQL Describe identifiers and identify valid and invalid identifiers in PL/SQL

More information

Data Structures and Algorithms

Data Structures and Algorithms Data Structures and Algorithms CS245-2016S-06 Binary Search Trees David Galles Department of Computer Science University of San Francisco 06-0: Ordered List ADT Operations: Insert an element in the list

More information

Using Edit-Distance Functions to Identify Similar E-Mail Addresses Howard Schreier, U.S. Dept. of Commerce, Washington DC

Using Edit-Distance Functions to Identify Similar E-Mail Addresses Howard Schreier, U.S. Dept. of Commerce, Washington DC Paper 073-29 Using Edit-Distance Functions to Identify Similar E-Mail Addresses Howard Schreier, U.S. Dept. of Commerce, Washington DC ABSTRACT Version 9 of SAS software has added functions which can efficiently

More information

Key Skills IT Level 3. Lagan Health Club. Classroom Activity

Key Skills IT Level 3. Lagan Health Club. Classroom Activity Key Skills IT Level 3 Lagan Health Club Classroom Activity Try to complete ALL the tasks ENTER YOUR CANDIDATE NUMBER AND CENTRE NUMBER ON EVERY PAGE AS A FOOTER Pages without a name will not be marked

More information

Chapter 1 Learning to Program With Alice

Chapter 1 Learning to Program With Alice Chapter 1 Learning to Program With Alice (Duke Book) Rather than typing a difficult, long and obscure computer language in the hopes of getting a calculation, with Alice you will be more like a director

More information

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions Announcements SE 1: Software Requirements Specification and Analysis Lecture 4: Basic Notations Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 Send your group

More information

1. Process Modeling. Process Modeling (Cont.) Content. Chapter 7 Structuring System Process Requirements

1. Process Modeling. Process Modeling (Cont.) Content. Chapter 7 Structuring System Process Requirements Content Chapter 7 Structuring System Process Requirements Understand the logical (&physical) process modeling by using data flow diagrams (DFDs) Draw DFDs & Leveling Balance higher-level and lower-level

More information

Chapter 3. Data Analysis and Diagramming

Chapter 3. Data Analysis and Diagramming Chapter 3 Data Analysis and Diagramming Introduction This chapter introduces data analysis and data diagramming. These make one of core skills taught in this course. A big part of any skill is practical

More information

Introduction to Microsoft Access

Introduction to Microsoft Access Welcome to Teach Yourself: Introduction to Microsoft Access This Teach Yourself tutorial explains the basic operations and terminology of Microsoft Access 2003, a database management program. Microsoft

More information

Module 1. Introduction to Software Engineering. Version 2 CSE IIT, Kharagpur

Module 1. Introduction to Software Engineering. Version 2 CSE IIT, Kharagpur Module 1 Introduction to Software Engineering Lesson 2 Structured Programming Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the important features of

More information

90 HOURS PROGRAMME LEVEL A1

90 HOURS PROGRAMME LEVEL A1 90 HOURS PROGRAMME LEVEL A1 GENERAL AIMS On completing this course, students should be able to: be familiar with the Spanish alphabet letters and signs and relate them to the corresponding sounds. recognise

More information

Instructional Design Framework CSE: Unit 1 Lesson 1

Instructional Design Framework CSE: Unit 1 Lesson 1 Instructional Design Framework Stage 1 Stage 2 Stage 3 If the desired end result is for learners to then you need evidence of the learners ability to then the learning events need to. Stage 1 Desired Results

More information

Describe the process of parallelization as it relates to problem solving.

Describe the process of parallelization as it relates to problem solving. Level 2 (recommended for grades 6 9) Computer Science and Community Middle school/junior high school students begin using computational thinking as a problem-solving tool. They begin to appreciate the

More information

Java: Learning to Program with Robots. Chapter 11: Building Quality Software

Java: Learning to Program with Robots. Chapter 11: Building Quality Software Java: Learning to Program with Robots Chapter 11: Building Quality Software Chapter Objectives After studying this chapter, you should be able to: Identify characteristics of quality software, both from

More information

Exercise 8: SRS - Student Registration System

Exercise 8: SRS - Student Registration System You are required to develop an automated Student Registration System (SRS). This system will enable students to register online for courses each semester. As part of the exercise you will have to perform

More information

6 March 2007 1. Array Implementation of Binary Trees

6 March 2007 1. Array Implementation of Binary Trees Heaps CSE 0 Winter 00 March 00 1 Array Implementation of Binary Trees Each node v is stored at index i defined as follows: If v is the root, i = 1 The left child of v is in position i The right child of

More information

Word 2007: Mail Merge Learning Guide

Word 2007: Mail Merge Learning Guide Word 2007: Mail Merge Learning Guide Getting Started Mail merge techniques allow you to create a document which combines repetitive text elements with data drawn from an external data document. To perform

More information

Innovative Fraud Monitoring. Identifying and combatting fraud in real time January 2014

Innovative Fraud Monitoring. Identifying and combatting fraud in real time January 2014 Innovative Fraud Monitoring Identifying and combatting fraud in real time January 2014 Technology and Shrinking Margins Easier to commit fraud more incentive to do it International Call Termination Originating

More information

Exporting Email Addresses. for Use in Outlook Express

Exporting Email Addresses. for Use in Outlook Express Exporting Email Addresses for Use in Outlook Express If your Keystroke Customer database includes email addresses, it is a relatively simple and easy process to export the Customer records and import them

More information

Data Structures Using C++ 2E. Chapter 5 Linked Lists

Data Structures Using C++ 2E. Chapter 5 Linked Lists Data Structures Using C++ 2E Chapter 5 Linked Lists Doubly Linked Lists Traversed in either direction Typical operations Initialize the list Destroy the list Determine if list empty Search list for a given

More information

How To Filter A List In Jangomail In A Database In A Row 7.5.2.2 (For A List)

How To Filter A List In Jangomail In A Database In A Row 7.5.2.2 (For A List) Summary JangoMail Tutorial Advanced Filtering of List Members This tutorial teaches you how to filter a List to send to only members that match a certain criteria. Perhaps you only want to send to the

More information

GCE Computing. COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination.

GCE Computing. COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination. GCE Computing COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination 2510 Summer 2014 Version: 1.0 Further copies of this Report are available from aqa.org.uk

More information

Digital Literacy: Communicating, Collaborating and E- Safety, Multimedia, Music and Sound, Digital Imagery

Digital Literacy: Communicating, Collaborating and E- Safety, Multimedia, Music and Sound, Digital Imagery Digital Literacy: Communicating, Collaborating and E- Safety, Multimedia, Music and Sound, Digital Imagery KS1: Pupils are taught to: use technology safely and respectfully, keeping personal information

More information

Binary search algorithm

Binary search algorithm Binary search algorithm Definition Search a sorted array by repeatedly dividing the search interval in half. Begin with an interval covering the whole array. If the value of the search key is less than

More information

Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability

Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability Aras Corporation 2005 Aras Corporation. All rights reserved Notice of Rights All rights reserved. Aras Corporation (Aras) owns this document. No part of this document may be reproduced or transmitted in

More information

The Elective Part of the NSS ICT Curriculum D. Software Development

The Elective Part of the NSS ICT Curriculum D. Software Development of the NSS ICT Curriculum D. Software Development Mr. CHEUNG Wah-sang / Mr. WONG Wing-hong, Robert Member of CDC HKEAA Committee on ICT (Senior Secondary) 1 D. Software Development The concepts / skills

More information

Linked List as an ADT (cont d.)

Linked List as an ADT (cont d.) Linked List as an ADT (cont d.) Default constructor Initializes list to an empty state Destroy the list Deallocates memory occupied by each node Initialize the list Reinitializes list to an empty state

More information

PEMBINA TRAILS SCHOOL DIVISION. Information Technology Department. Mayet Online Reports

PEMBINA TRAILS SCHOOL DIVISION. Information Technology Department. Mayet Online Reports PEMBINA TRAILS SCHOOL DIVISION Information Technology Department Mayet Online Reports PEMBINA TRAILS SCHOOL DIVISION INFORMATION TECHNOLOGY DEPARTMENT Mayet Online Reports Ivone Batista Instructional Technology

More information

Design and UML Class Diagrams. Suggested reading: Practical UML: A hands on introduction for developers http://dn.codegear.

Design and UML Class Diagrams. Suggested reading: Practical UML: A hands on introduction for developers http://dn.codegear. Design and UML Class Diagrams Suggested reading: Practical UML: A hands on introduction for developers http://dn.codegear.com/article/31863 UML Distilled Ch. 3, by M. Fowler 1 Big questions What is UML?

More information

User Replicator USER S GUIDE

User Replicator USER S GUIDE User Replicator USER S GUIDE Contents 1. Introduction... 2 1.1. User Replicator requirements... 2 2. Creating users in Learning Center from the Active Directory... 3 2.1. Process File... 3 2.2 Users Mappings...

More information

Common Questions and Concerns About Documentum at NEF

Common Questions and Concerns About Documentum at NEF LES/NEF 220 W Broadway Suite B Hobbs, NM 88240 Documentum FAQ Common Questions and Concerns About Documentum at NEF Introduction...2 What is Documentum?...2 How does Documentum work?...2 How do I access

More information

ESCUELA DE LENGUAS CENTRO DE IDIOMAS ESCUELA SUPERIOR POLITECNICA DE CHIMBORAZO LANGUAGE CENTER

ESCUELA DE LENGUAS CENTRO DE IDIOMAS ESCUELA SUPERIOR POLITECNICA DE CHIMBORAZO LANGUAGE CENTER ESCUELA SUPERIOR POLITECNICA DE CHIMBORAZO LANGUAGE CENTER ENGLISH SYLLABUS FOR THE SCHOOL OF ECOTOURISM ENGINEERING LEVELS: IV, V, VI, VII INFORMATION DATA: SCHOOL: ECOTOURISM. SUBJECT: ENGLISH LEVELS:

More information

CPS122 - OBJECT-ORIENTED SOFTWARE DEVELOPMENT. Team Project

CPS122 - OBJECT-ORIENTED SOFTWARE DEVELOPMENT. Team Project CPS122 - OBJECT-ORIENTED SOFTWARE DEVELOPMENT Team Project Due Dates: See syllabus for due dates for each milestone This project spans much of the semester, to be completed as a series of milestones, each

More information

Comprehensive Course Syllabus

Comprehensive Course Syllabus Comprehensive Course Syllabus Computational Thinking Course Description: The course introduces students to the principles of computational thinking. Computational thinking is a way of solving problems,

More information

TEST-TAKING STRATEGIES FOR READING

TEST-TAKING STRATEGIES FOR READING TEST-TAKING STRATEGIES FOR READING For students who have enrolled in this class shortly before taking the reading proficiency exam, here are some helpful test-taking strategies you can use: 1. Always read

More information

Developing Web Applications for Microsoft SQL Server Databases - What you need to know

Developing Web Applications for Microsoft SQL Server Databases - What you need to know Developing Web Applications for Microsoft SQL Server Databases - What you need to know ATEC2008 Conference Session Description Alpha Five s web components simplify working with SQL databases, but what

More information

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. & BSc. (Hons.) Software Engineering

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. & BSc. (Hons.) Software Engineering BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security & BSc. (Hons.) Software Engineering Cohort: BIS/05/FT BCNS/05/FT BSE/05/FT Examinations for 2005-2006 / Semester

More information

Migrating application users and passwords with Password Manager

Migrating application users and passwords with Password Manager Migrating application users and passwords with Password Manager 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Migrating Users 1 3 Initializing Passwords 2 4 Maintaining

More information

Fundamentals of Computer Programming CS 101 (3 Units)

Fundamentals of Computer Programming CS 101 (3 Units) Fundamentals of Computer Programming CS 101 (3 Units) Overview This course introduces students to the field of computer science and engineering. An overview of the disciplines within computer science such

More information

AP Computer Science AB Syllabus 1

AP Computer Science AB Syllabus 1 AP Computer Science AB Syllabus 1 Course Resources Java Software Solutions for AP Computer Science, J. Lewis, W. Loftus, and C. Cocking, First Edition, 2004, Prentice Hall. Video: Sorting Out Sorting,

More information

6. Standard Algorithms

6. Standard Algorithms 6. Standard Algorithms The algorithms we will examine perform Searching and Sorting. 6.1 Searching Algorithms Two algorithms will be studied. These are: 6.1.1. inear Search The inear Search The Binary

More information

More on Objects and Classes

More on Objects and Classes Software and Programming I More on Objects and Classes Roman Kontchakov Birkbeck, University of London Outline Object References Class Variables and Methods Packages Testing a Class Discovering Classes

More information

How to Define Local Audit Periods and Add Local Audits

How to Define Local Audit Periods and Add Local Audits How to Define Local Audit Periods and Add Local Audits Scope: Organisation Administrators, Region Administrators, Organisation Group Administrators Screen overview - 1) TOP LEVEL MENU 2) ADD NEW BUTTON

More information