Chapter 12: Computer Programming

Slides:



Advertisements
Similar presentations
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 15 Programming and Languages: Telling the Computer What to Do.
Advertisements

CHAPTER 2 GC101 Program’s algorithm 1. COMMUNICATING WITH A COMPUTER  Programming languages bridge the gap between human thought processes and computer.
Chapter 8 High-Level Programming Languages. 8-2 Chapter Goals Describe the translation process and distinguish between assembly, compilation, interpretation,
Chapter 12 Computer Programming
Chapter 12 Computer Programming.
Computers Are Your Future
Chapter 2- Visual Basic Schneider1 Chapter 2 Problem Solving.
Computers: Tools for an Information Age
Chapter 2: Input, Processing, and Output
Java Programming, 3e Concepts and Techniques Chapter 1 An Introduction to Java and Program Design.
Visual Basic Introduction IDS 306 from Shelly, Cashman & Repede Microsoft Visual Basic 5: Complete Concepts and Techniques.
Programming Logic and Design, Introductory, Fourth Edition1 Understanding Computer Components and Operations (continued) A program must be free of syntax.
Chapter 1 Program Design
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Computer Programming.
Chapter 2- Visual Basic Schneider1 Chapter 2 Problem Solving.
Chapter 3 Planning Your Solution
11 Computer Programming Section A Programming Basics CHAPTER
Programming Paradigms Imperative programming Functional programming Logic programming Event-driven programming Object-oriented programming A programming.
Computer Programming and Database Handout
Java Programming, 2E Introductory Concepts and Techniques Chapter 1 An Introduction to Java and Program Design.
Chapter 2: Developing a Program Prelude to Programming Concepts and Design Copyright © 2001 Scott/Jones, Inc.. All rights reserved. 1 Chapter 2 Developing.
Programming Languages: Telling the Computers What to Do Chapter 16.
Structured COBOL Programming, Stern & Stern, 9th edition
Extended Prelude to Programming Concepts & Design, 3/e by Stewart Venit and Elizabeth Drake Chapter 2: Developing a Program.
CIS Computer Programming Logic
信息处理技术.
Programming Lifecycle
Computer Concepts 2014 Chapter 12 Computer Programming.
© 2011 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of Stewart Venit ~ Elizabeth Drake Developing a Program.
Chapter 12 Computer Programming. Chapter Contents Chapter 12: Computer Programming 2  Section A: Programming Basics  Section B: Procedural Programming.
Chapter 12 Computer Programming. 12 Chapter 12: Computer Programming 2 Chapter Contents  Section A: Programming Basics  Section B: Procedural Programming.
Computer Concepts 2013 Chapter 12 Computer Programming.
Computer Concepts 2014 Chapter 12 Computer Programming.
The Software Development Process
© 2006 Pearson Addison-Wesley. All rights reserved 2-1 Chapter 2 Principles of Programming & Software Engineering.
Computer Concepts 2013 Chapter 12 Computer Programming.
Chapter 12: Computer Programming 1 Computer Programming Chapter 12.
1 The Software Development Process ► Systems analysis ► Systems design ► Implementation ► Testing ► Documentation ► Evaluation ► Maintenance.
PROGRAMMING (1) LECTURE # 1 Programming and Languages: Telling the Computer What to Do.
Introduction to Algorithm. What is Algorithm? an algorithm is any well-defined computational procedure that takes some value, or set of values, as input.
Principles of Programming & Software Engineering
Unit 11 Programming.
Chapter 12 Computer Programming.
Computer Programming (BCT 1113)
CSCI-235 Micro-Computer Applications
1-1 Logic and Syntax A computer program is a solution to a problem.
Chapter 2: Input, Processing, and Output
DDC 1023 – Programming Technique
Chapter 2- Visual Basic Schneider
System Design.
Chapter Topics 2.1 Designing a Program 2.2 Output, Input, and Variables 2.3 Variable Assignment and Calculations 2.4 Variable Declarations and Data Types.
Computer Programming.
Programming languages and software development
Designing and Debugging Batch and Interactive COBOL Programs
An Introduction to Structured Program Design in COBOL
Chapter 2- Visual Basic Schneider
Chapter 1 Introduction(1.1)
Chapter 2- Visual Basic Schneider
Algorithm and Ambiguity
Principles of Programming Languages
Data and Flowcharts Session
ICT Gaming Lesson 2.
Tonga Institute of Higher Education IT 141: Information Systems
Data and Flowcharts Session
Tonga Institute of Higher Education IT 141: Information Systems
Chapter 2: Input, Processing, and Output
Basic Concepts of Algorithm
Chapter 4: Writing and Designing a Complete Program
Programming Logic and Design Eighth Edition
Presentation transcript:

Chapter 12: Computer Programming

Chapter 12: Computer Programming Programming Basics Computer Programming and Software Engineering Programming Languages and Paradigms Program Planning Program Coding Program Testing and Documentation Programming Tools Chapter 12: Computer Programming

Computer Programming and Software Engineering The instructions that make up a computer program are sometimes referred to as code Programs can have millions of lines of code Chapter 12: Computer Programming

Computer Programming and Software Engineering Figure 12-1 Chapter 12: Computer Programming

Programming Languages and Paradigms Programming languages are made up of keywords and grammar rules designed for creating computer instructions Low-level languages High-level languages Chapter 12: Computer Programming

Programming Languages and Paradigms First-generation languages Second-generation languages Third-generation languages Chapter 12: Computer Programming

Programming Languages and Paradigms Fourth-generation languages Fifth-generation languages The Programming Paradigm Chapter 12: Computer Programming

Programming Languages and Paradigms Figure 12-8 Chapter 12: Computer Programming

Chapter 12: Computer Programming Program Planning The problem statement defines certain elements that must be manipulated to achieve a result or goal You accept assumptions as true to proceed with program planning Known information helps the computer to solve a problem Variables vs. constants Chapter 12: Computer Programming

Chapter 12: Computer Programming Program Planning Problem statement: Assuming that there are two pizzas to compare, that both pizzas contain the same toppings, and that the pizzas could be round or square, and given the prices, shapes, and sizes of the two pizzas, the computer will print a message indicating which pizza has the lower price per square inch Chapter 12: Computer Programming

Chapter 12: Computer Programming Program Coding A text editor such as Notepad allows programmers to enter lines of code using a familiar word processing interface. Figure 12-11 Chapter 12: Computer Programming

Chapter 12: Computer Programming Program Coding VDE (visual development environment) Form design grid Control Properties Event Event- handling code Figure 12-12 Chapter 12: Computer Programming

Chapter 12: Computer Programming Program Coding Controls, such as the Best Deal button, can be selected by a programmer from a properties list. Here a programmer is selecting the background color for the Best Deal button. Figure 12-13 Chapter 12: Computer Programming

Chapter 12: Computer Programming Program Coding Figure 12-14 Chapter 12: Computer Programming

Program Testing and Documentation A computer program must be tested Program errors include Syntax errors Runtime errors Logic errors Debugger Chapter 12: Computer Programming

Program Testing and Documentation Remarks/Comments Figure 12-16 Chapter 12: Computer Programming

Chapter 12: Computer Programming Programming Tools SDK (software development kit) IDE (integrated development environment) Chapter 12: Computer Programming

Chapter 12: Computer Programming Programming Tools Component API C and C++ are the most popular programming languages Chapter 12: Computer Programming

Procedural Programming Algorithms Expressing an Algorithm Sequence, Selection, and Repetition Controls Procedural Languages and Applications Chapter 12: Computer Programming

Chapter 12: Computer Programming Algorithms What is an algorithm? Record steps to solve the problem Specify how to manipulate information Specify a solution Chapter 12: Computer Programming

Chapter 12: Computer Programming Algorithms Figure 12-21 Chapter 12: Computer Programming

Expressing an Algorithm Pseudocode Figure 12-22 Chapter 12: Computer Programming

Expressing an Algorithm Flowchart The pizza program flowchart illustrates how the computer should proceed through the instructions in the final program. Figure 12-23 Chapter 12: Computer Programming

Expressing an Algorithm Perform a walkthrough to make sure your algorithm works Figure 12-24 Chapter 12: Computer Programming

Sequence, Selection, and Repetition Controls Sequence control structure Executing a GOTO command directs the computer to a different part of the program. Figure 12-25 Chapter 12: Computer Programming

Sequence, Selection, and Repetition Controls Subroutines, procedures, and functions Figure 12-26 Chapter 12: Computer Programming

Sequence, Selection, and Repetition Controls Selection control structure The computer executes a decision indicated on the flowchart by the question in the diamond shape. Figure 12-27 Chapter 12: Computer Programming

Sequence, Selection, and Repetition Controls Repetition control structure To execute a loop, the computer repeats one or more commands until some condition indicates that the looping should stop. Figure 12-28 Chapter 12: Computer Programming

Procedural Languages and Applications Popular procedural languages include FORTRAN, COBOL, FORTH, APL, ALGOL, PL/1, Pascal, C, Ada, and BASIC The procedural approach is best used for problems that can be solved by following a step-by-step algorithm Produces programs that run quickly and efficiently Chapter 12: Computer Programming

Object-Oriented Programming Objects and Classes Inheritance Methods and Messages Object-oriented Program Structure Object-oriented Languages and Applications Chapter 12: Computer Programming

Chapter 12: Computer Programming Objects and Classes Object Class Figure 12-30 Chapter 12: Computer Programming

Chapter 12: Computer Programming Inheritance What is inheritance? Superclass Subclass Class hierarchy Figure 12-33 Chapter 12: Computer Programming

Chapter 12: Computer Programming Methods and Messages Method Collect input, perform calculations, etc. A method is activated by a message Can be defined along with the class they affect Polymorphism Chapter 12: Computer Programming

Object-Oriented Program Structure Figure 12-39 Chapter 12: Computer Programming

Object-Oriented Program Structure Figure 12-40 Chapter 12: Computer Programming

Object-Oriented Program Structure When the pizza program runs, on-screen prompts ask for the shape, size, and price of each pizza; then the program displays a message that indicates which pizza is the best deal. Figure 12-41 Chapter 12: Computer Programming

Object-Oriented Languages and Applications SIMULA was believed to be the first object-oriented computer language The Dynabook project was the second major development in object-oriented languages Popular object-oriented languages today are Ada95, C++, Visual Basic, C#, and Java The O-O paradigm results in decreased runtime efficiency, but allows encapsulation, which hides the internal details of objects and their methods Chapter 12: Computer Programming

Declarative Programming The Declarative Paradigm Prolog Facts Prolog Rules Input Capabilities Declarative Languages and Applications Chapter 12: Computer Programming

The Declarative Paradigm Attempts to describe a problem without specifying exactly how to arrive at a solution Chapter 12: Computer Programming

Chapter 12: Computer Programming Secure Programming Black Hat Exploits Secure Software Development Mitigation Chapter 12: Computer Programming

Chapter 12: Computer Programming Black Hat Exploits Today’s operating systems, utilities, and application software are full of defects that create security holes, which are exploited by black hats Buffer overflow Chapter 12: Computer Programming

Chapter 12: Computer Programming Black Hat Exploits Figure 12-53 Chapter 12: Computer Programming

Chapter 12: Computer Programming Black Hat Exploits Verbose error messages can also present attackers with information about the directory location of programs or files, the structure of a database, or the layout of the program in memory Figure 12-54 Chapter 12: Computer Programming

Secure Software Development Most software security problems can be traced back to defects that programmers unintentionally introduce in software during design and development Formal methods help programmers apply rigorous logical and mathematical models to software design, coding, testing, and verification Threat modeling (risk analysis) – used by security designer to determine (1) what are important issues the designer cares about and (2) a description of a set of security aspects (possible attacks to consider) Chapter 12: Computer Programming

Secure Software Development Chapter 12: Computer Programming

Secure Software Development An attack tree is a hierarchical diagram of potential attacks against a system Figure 12-56 Chapter 12: Computer Programming

Secure Software Development Defensive programming (AKA secure programming) Source code walkthroughs Simplification Filtering input Chapter 12: Computer Programming

Secure Software Development Signed code Figure 12-57 Chapter 12: Computer Programming

Chapter 12: Computer Programming Mitigation Despite defensive programming and other tactics to produce secure software, some defects inevitably remain undiscovered in products that end up in the consumers’ hands. When bugs are discovered, the programmer’s remaining line of defense is to produce a bug fix, or patch Figure 12-58 Chapter 12: Computer Programming

Chapter 12: Computer Programming Mitigation Take the following steps to avoid security problems that stem from software defects Select applications from software publishers with a good security track record Watch for patches and apply them Consider using open source software, which has been extensively reviewed by the programming community Keep your firewall and antivirus software deployed and up-to-date Chapter 12: Computer Programming

Chapter 12: Computer Programming Chapter 12 Complete Computer Programming Chapter 12: Computer Programming