Task 1 1. Analyzing an defining the problem to be solved 2. Designing the program 3. Coding 4. Testing 5. Documenting 6. Training the users 7. Obtaining feedback from users Task 2 I'd say "Well ain't that an issue in need of a solution. It'd be a shame if someone were to try and fix it." Task 3 a. Circle - connector b. Parallelogram - input/output c. Rectangle - operation/process d. Diamond - decision e. Ellipse - start/stop Task 4 ________________ | | | DO THING | | | ---------------- Task 5 Start Input initial cost (C) If (C) is greater than 100: Rate (R) = 15% Else: Rate (R) = 10% Task 6 Logic error - Definition: The logic with which the program is built is flawed, thus causing it to behave in unexpected ways. It is much harder to detect, because the machine executes the code correctly, yet the outcome is undesired. - Example: You write a program that is supposed to exit out of a loop when an index 'i' goes beyond 10. In the condition section where the loop is declared you write 'i < 10', so the program exits when 'i' is no longer lesser than 10, exitting at 9 instead of 10. - Ways to avoid or deal with this kind of error: Do constant tests to verify the results are the ones expected. Consider edge cases, where very strange conditions are met, to truly test the consistency of your code's output. Task 7 Problems Solutions 1. Connect a computer to a telephone line g. Install a modem 2. Identify items for pricing i. Use barcode labels 3. Add extra facilities to a computer f. Install an expansion card 4. Get more file storage space h. Fit a bigger hard disk 5. Find syntax errors b. Use the debug command 6. Avoid marking the surface of a CD-ROM j. Hold it by the edges 7. Improve the speed of your computer c. Add more memory 8. Avoid system errors e. Fit a bigger hard disk ??? 9. Prepare a new disk for use d. Format the disk 10. Transfer information between computers a. Write code to check a peripheral is present before any data is sent Task 8 1. Make sure there are no viruses on a floppy disk Run a malware scan on its contents. 2. Prevent unauthorized access to a network Set up a WPA2 pre-shared key infrastructure. 3. Avoid the risk of losing data Use redundant storage. 4. Avoid eyestrain when using computers Install a screen protector, lower the brightness and use blue light glasses. 5. Avoid back problems when using computers Make sure to have good posture when sitting at the computer. Task 9 ./prepare_for_an_exam.pdf