Year 10 & 11 Programming Similar, But Different!

Slides:



Advertisements
Similar presentations
The Software Lifecycle. Example Problem: Update a Checkbook Write a program that allows the user to enter a starting balance, a transaction type, D or.
Advertisements

Session 5 of 10 Review + Multiple Sprites
Solving a System of Equations by ELIMINATION. Elimination Solving systems by Elimination: 1.Line up like terms in standard form x + y = # (you may have.
C++ Functions. 2 Agenda What is a function? What is a function? Types of C++ functions: Types of C++ functions: Standard functions Standard functions.
Python File Handling. In all the programs you have made so far when program is closed all the data is lost, but what if you want to keep the data to use.
Mastering Char to ASCII AND DOING MORE RELATED STRING MANIPULATION Why VB.Net ?  The Language resembles Pseudocode - good for teaching and learning fundamentals.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
5 BASIC CONCEPTS OF ANY PROGRAMMING LANGUAGE Let’s get started …
C++ Programming Language Lecture 2 Problem Analysis and Solution Representation By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department.
NFIRS Data Entry Browser Interface (DEBI)
Protecting Your Password
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Vendor Master Record Registration To Register New or Update an Existing Supplier Registration
The Hashemite University Computer Engineering Department
Flowchart. a diagram of the sequence of movements or actions of people or things involved in a complex system or activity. a graphical representation.
Learning Objective To be able to… Understand flow chart symbols Complete and correct flow chart algorithms Create a program based on a flow chart.
Agenda Customizing a Unix/Linux account Environment Introduction to Start-up Files (.bash_profile,.bashrc,.profile,.kshrc) Safe Methods for Changing Start-up.
Solving a System of Equations by ELIMINATION. Elimination Solving systems by Elimination: 1.Line up like terms in standard form x + y = # (you may have.
Programming revision Revision tip: Focus on the things you find difficult first.
GCSE COMPUTER SCIENCE Practical Programming using Python Lesson 4 - Selection.
Validation and verification 1.2
SIMnet Student Registration Guide
GCSE COMPUTER SCIENCE Practical Programming using Python
How to use UCAS Progress
A451 Theory – 7 Programming 7A, B - Algorithms.
An authorized user can make payments on your account by logging on with their own username and password. Click on the Authorized Users tab to add an authorized.
Repetition Structures
Introducing Instructions
CMSC201 Computer Science I for Majors Lecture 22 – Searching
Chapter 1. Introduction to Computers and Programming
Step up your cyber defence
Subtraction by counting on
IIT Indore © Neminah Hubballi
Introduction to C++ October 2, 2017.
Step up your cyber defence
Spreadsheet Modelling
Psuedo Code.
Department of modern foreign languages ü]
How to Navigate MyNaropa
Agenda Warmup Lesson 2.5 (Ascii, Method Overloading)
Department of modern foreign languages ü]
Why PERFORMING BACKGROUND CHECKS on Your TENANTS Can Save Money.
Fun gym Cambridge Nationals R001.
Web Systems Development (CSC-215)
Fun gym Cambridge Nationals R001.
Computer Science 2 Hashing
Fill the screen challenge!
PHP: Security issues FdSc Module 109 Server side scripting and
Unit 1: Introduction Lesson 1: PArts of a java program
Teaching London Computing
If selection construct
We’re moving on to more recap from other programming languages
Computer Science Testing.
Repetition Structures
Skillstutor.com.
Coding Concepts (Data- Types)
We are starting JavaScript. Here are a set of examples
Always update the McFletcher website by clicking refresh
Computer Science 2 Hashing.
Access to the VA Medical Records
Language Constructs Construct means to build or put together. Language constructs refers to those parts which make up a high level programming language.
Flowcharts and Pseudo Code
CSCI N207 Data Analysis Using Spreadsheet
Clear and Unclear Windows
User Input Keyboard input.
Always update the McFletcher website by clicking refresh
Hint idea 2 Split into shorter tasks like this.
Learning Intention I will learn about the standard algorithm for input validation.
Completing the Primary Reference portion of the Student Profile
Keeping your passwords safe
Presentation transcript:

Year 10 & 11 Programming Similar, But Different! Practice Tasks covering the types of tasks that you may be asked to complete as part of your NEA – These are not the actual tasks!

SBD Task Background Hashing is used for bit coin mining, banking, and saving passwords safely. It is a way to check for errors in data without giving away what the data actually is. For hashing to work, the original data must be entered in & processed using a hashing algorithm. When the data is checked, it is rehashed & the two hashed codes are checked against each other.

SBD Task 1 Write a program that allows a user to enter a username & password. The password must be longer than 6 characters and must not be just a number. The password must then be saved as a hashed value using the following steps: Take in a password Get ASCI number Double every other letter Add all the numbers together to make a hash code p a s w o r d 112 97 115 119 111 114 100 194 230 222 200 = 1306

SBD Task 1 – STEP 1 Write a program that allows a user to enter a username & password. The password must be longer than 6 characters and must not be just a number. The password must then be saved as a hashed value using the following steps: Take in a password Get ASCI number Double every other letter Add all the numbers together to make a hash code p a s w o r d 112 97 115 119 111 114 100 194 230 222 200 = 1306

How does your flowchart compare? How could you make improvements?

What is the difference between a local & global variable? Why would the function use a local variable?

SBD Task 1 – STEP 1

SBD Task 1 – STEP 1

SBD Task 1 – STEP 2 Write a program that allows a user to enter a username & password. The password must be longer than 6 characters and must not be just a number. The password must then be saved as a hashed value using the following steps: Take in a password Get ASCI number Double every other letter Add all the numbers together to make a hash code p a s w o r d 112 97 115 119 111 114 100 194 230 222 200 = 1306

How have we updated the flowchart? What new symbol has been added?

How have we updated the flowchart? What new symbols have been added?

Why is it possible to use the variable name password twice? Is the second ‘password’ really a variable, or is it something else…

SBD Task 1 – STEP 2 (THE FUNCTION)

SBD Task 1 – STEP 2 (the function)

SBD Task 1 – STEP 2 (the MAIN CODE)

SBD Task 1 – STEP 2 (the MAIN CODE) What did we need to update in the main code to include the hashing algorithm? Why not just include it here?

SBD Task 1 – STEP 3 Write a program that allows a user to enter a username & password. The password must be longer than 6 characters and must not be just a number. The password must then be saved as a hashed value using the following steps: Take in a password Get ASCI number Double every other letter Add all the numbers together to make a hash code p a s w o r d 112 97 115 119 111 114 100 194 230 222 200 = 1306

What is MOD & DIV?

How have we updated the flowchart? How are we deciding is a number is even?

SBD Task 1 – STEP 3 (the function)

SBD Task 1 – STEP 3 (the function)