 byte  short  int  long  float  double  boolean  char.

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
STRING AN EXAMPLE OF REFERENCE DATA TYPE. 2 Primitive Data Types  The eight Java primitive data types are:  byte  short  int  long  float  double.
CSC1351 9/6/2011 Where are we?. Polymorphism // Use dynamic lookup to allow different data types to be manipulated // with a uniform interface. public.
Chapter 1: The Context of SA&D Methods
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Introduction to Java Appendix A. Appendix A: Introduction to Java2 Chapter Objectives To understand the essentials of object-oriented programming in Java.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Unit 3- Introduction to Computer Ethics
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Math class services (functions) Primitive vs reference data types Scanner class Math class services (functions) Primitive vs reference data types Scanner.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
Using Data Within a Program Chapter 2.  Classes  Methods  Statements  Modifiers  Identifiers.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
BEGINNING PROGRAMMING.  Literally – giving instructions to a computer so that it does what you want  Practically – using a programming language (such.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Spring 2009 Programming Fundamentals I Java Programming XuanTung Hoang Lecture No. 8.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
CPSC 233 Tutorial January 21 st /22 nd, Linux Commands.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
Objects as a programming concept
JAVA MULTIPLE CHOICE QUESTION.
Unit-2 Objects and Classes
Computers & Programming Languages
An Introduction to Java – Part I, language basics
Programs and Classes A program is made up from classes
Session 2: Introduction to Object Oriented Programming
Presentation transcript:

 byte  short  int  long  float  double  boolean  char

1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. 7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People’s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.

 Software life cycle › A sequence of steps in software engineering to develop the specified software  Software improvement models › Various models to help develop software  Object Oriented Programming › Used to build classes and objects and to define the relationship between objects

 The Scanner class is used to read in user input  It has several methods that allow users to manipulate the input › The Split method of the Scanner class allows users to divide the input into chunks with the use of a delimiter › String x = “Jessa/Schwarting/Member”; String[] y = x.split(“/”);

 Wrapper classes are used to convert primitive data types into objects, and to convert objects into primitive data types › Integer.convertToInt(x) › Double.convertToDouble(y) › Etc.

 Inheritance allows users to create parent and child classes, where the parent classes contain variables and methods that the children classes can use. › Parent classes are abstract and can contain abstract methods  Polymorphism allows objects to take on different forms › Generally used when a parent class is used to refer to a child class › Example: Customer x = new NonMemberCustomer();

 Exceptions are errors that occur while a program is running. › Ex: FileNotFound › Users can define their own  I/O Streams › Used to read in files  Number/Decimal Format › Used to format numbers Tutor tip: Find the code for these concepts in your notes and write them down on your crib sheets!

 Nested Classes have two types – static and non-static. › Non-static nested classes (inner classes) have access to whatever is in the enclosing class, private or not › Static nested classes do not.

Any questions?