ITEC 320 Lecture 10 Examples. Review Strings –What types are there? –What are the differences? –What should you use where? Homework –Hardest part –Easiest.

Slides:



Advertisements
Similar presentations
Accounting for Depreciation – THE STEPS STEP 6 – Balance the Accumulated Depreciation Account The closing balance should be on the debit side STEP 5 –
Advertisements

TE Sessions Supported by: Basic Concepts of Programming November 3, 2012.
ITEC 320 Lecture 3 In-class coding / Arrays. Arrays Review Strings –Advantages / Disadvantages Input –What two methods are used? Conditionals Looping.
Week 8 Arrays Part 2 String & Pointer
Lecture 12: Engineering Problem 2. Outline 2 Learning Objectives Experience in engineering problems Lecture Topics Payback period.
Computer Organization CS345 David Monismith Based upon notes by Dr. Bill Siever and notes from the Patternson and Hennessy Text.
ITEC 320 Lecture 4 Sub-Types Functions. Functions / Procedures Review Types Homework Questions?
Graph Theory ITEC 320 Lecture 21. Graph Theory Review Higher level usage of pointers –Factories –Flyweight –Disk pool Rationale Benefits / Downsides.
Python Magic Select a Lesson: Why Learn to Code? Basic Python Syntax
Engineering Computing I Chapter 1 – Part B A Tutorial Introduction continued.
1 Array, Pointer and Reference ( I ) Ying Wu Electrical Engineering and Computer Science Northwestern University EECS 230 Lectures.
Topic R3 – Review for the Final Exam. CISC 105 – Review for the Final Exam Exam Date & Time and Exam Format The final exam is 120-minutes, closed- book,
CSI 101 Spring 2009 Review and Recap of Visual Basic Wednesday, April 29 th.
Chapter 7 Queues. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 7-2 Chapter Objectives Examine queue processing Define a queue abstract.
COM148X1 Interactive Programming Lecture 3. Topics Today String Functions Using Timer Looping.
ITEC 320 Procedural Programming Dr. Ray Lecture 1.
Trial Balance. The information for ledgers comes from balance sheets. -This means it is already in balance. As you make changes to the Ledger, it is possible.
Chapter 10.1 Bank Reconciliation Heading Write the heading.
Fac of Ene & Surveying U.S.Q.1 E0001 Computers in Engineering DO.... LOOP.
STRINGS & STRING HANDLING FUNCTIONS STRINGS & STRING HANDLING FUNCTIONS.
STRINGS CMSC 201 – Lab 3. Overview Objectives for today's lab:  Obtain experience using strings in Python, including looping over characters in strings.
Creating With Code.
C++ Basics Structure of a Program. C++ Source Code Plain text file Typical file extension .CPP Must compile the C++ source code without errors before.
ITEC 320 Lecture 5 Scope Exceptions. Scope / Exceptions Review Functions Procedures.
A Balanced Introduction to Computer Science, 3/E David Reed, Creighton University ©2011 Pearson Prentice Hall ISBN Chapter 15 JavaScript.
CDA COLLEGE ACC101: BOOK KEEPING II Lecture 10 Lecture 10 Lecturer: Kleanthis Zisimos.
1 Building Java Programs Chapter 7: Arrays These lecture notes are copyright (C) Marty Stepp and Stuart Reges, They may not be rehosted, sold, or.
Chapter 1 Pseudocode & Flowcharts
ENG College of Engineering Engineering Education Innovation Center 1 Array Accessing and Strings in MATLAB Topics Covered: 1.Array addressing. 2.
Math 15 Introduction to Scientific Data Analysis Lecture 8 Python Programming – Part 2 University of California, Merced.
ITEC 320 Lecture 11 Application Part Deux Look Ahead.
CPS120: Introduction to Computer Science Lecture 15 Arrays.
CSCI-100 Introduction to Computing
Scis.regis.edu ● CS-361: Control Structures Week 6 Dr. Jesús Borrego Lead Faculty, COS Regis University 1.
Computer Programming for Biologists Class 6 Nov 21 th, 2014 Karsten Hokamp
C++ Programming Lecture 7 Control Structure I (Selection) – Part II The Hashemite University Computer Engineering Department.
ITEC 109 Lecture 11 While loops. while loops Review Choices –1 st –2 nd to ?th –Last What happens if you only use ifs? Can you have just an else by itself?
Susie’s lecture notes are in the presenter’s notes, below the slides Disclaimer: Susie may have made errors in transcription or understanding. If there.
School of Computer Science & Information Technology G6DICP - Lecture 4 Variables, data types & decision making.
Lecture 13: Arrays, Pointers, Code examples B Burlingame 2 Dec 2015.
Review for Final (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2003 (Week 15, Friday 5/2/2003)
Homework #4: Operator Overloading and Strings By J. H. Wang Apr. 17, 2009.
2016 N5 Prelim Revision. HTML Absolute/Relative addressing in HTML.
FUNCTIONS. Midterm questions (1-10) review 1. Every line in a C program should end with a semicolon. 2. In C language lowercase letters are significant.
Escape sequence Certain characters, preceded by a backslash ( \ ), are known as escape sequences They are used to display certain characters, or as display.
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
1 GL trial balance check balance-brought-forward D … standard D … account balances period’s changes D – debit C - credit Check if sections.
Dani Vainstein1 VBScript Session 5. Dani Vainstein2 What we learn last session? Branching Branching using If … Then … Else statement. Branching using.
TCCICOMPUTERCOAC HING.COM.  TCCI’s main focus is to develop logical skill of the students, so it will help students to write code their self in any.
ITEC 320 Lecture 6 More on arrays / Strings. Arrays Review Scope Exceptions Arrays –Dynamic arrays How? Typed and anonymous.
Selection Using IF THEN ELSE CASE Introducing Loops.
Nested Loops CS303E: Elements of Computers and Programming.
Review….. Review…. Your Homework was… Page 96, Exercises 1,2,3 Page 107, ‘Exercise’ 1 A. (Use a T Account Ledger) Do the transactions for this ‘new’
ACCOUNTS RECEIVABLE LEDGER AND GENERAL LEDGER CONTROLLING ACCOUNT
Entry Task There are 20 vocabulary words on p. 200 and 201
Do it now activity Green pen activity in books.
String Manipulation.
Loops CS140: Introduction to Computing 1 Savitch Chapter 4 Flow of Control: Loops 9/18/13 9/23/13.
Structured Programming (Top Down Step Refinement)
Standard Algorithms Input validation Finding the minimum
Introduction to pseudocode
LING 388: Computers and Language
Final Exam.
CEV208 Computer Programming
LING/C SC/PSYC 438/538 Lecture 13 Sandiway Fong.
SECTION 5-3 Account Statements pp
Reading from and Writing to Files Part 2
C++ Programming Lecture 7 Control Structure I (Selection) – Part II
Iteration – While Loops
G6DICP - Lecture 5 Control Structures.
Presentation transcript:

ITEC 320 Lecture 10 Examples

Review Strings –What types are there? –What are the differences? –What should you use where? Homework –Hardest part –Easiest part –Thoughts?

Examples Outline Usage of ADA –Variables –Conditionals –Loops –Arrays

Examples Program 1 Character counter –Input strings less than 80 characters until eof and count number of spaces. Then count number of As, Bs,...Zs (case insensitive).

Examples Program 2 Given a string, compute recursively (no loops) the number of times lowercase "hi" appears in the string.

Examples Program 3 Caesar cipher of shift 3 to the right Character’val(65); Character’pos(‘A’);

Examples Program 4 Banking simulator –Customers –Account balances –Debit / Credit account

Examples Review Writing code in ADA Process Errors How to find answers