CPT 200 Week 2
.pdf
keyboard_arrow_up
School
University Of Arizona *
*We aren’t endorsed by this school
Course
CPT200
Subject
Computer Science
Date
Apr 30, 2024
Type
Pages
1
Uploaded by KidWaterGazelle42 on coursehero.com
CPT 200 Week 2.docx - CPT 200
Week 2 Assignment Employee...
DOC PREVIEW
End of preview
Want to read all 4 pages?
Upload your study docs or
become a member.
Students also studied
5.13.6 Permit Tra9c.pdf
MISM 4306
2
CS 340 Module Two 2-1
Assignment.docx
CS 340
3
Week 2 Assignment 1 -
CPT200 - Dave…
Davis.docx
CPT 200
3
Week 2 Assignment.docx
CPT 200
3
3.13_LAB_Exact_change.d
ocx
IT 140 H-1035
4
Week 2 Assignment 1
BMK.docx
CPT 200
4
Trending in CPT 200
CPT200 Week 4
Interactive Assignment…
Number Analysis Program
CPT 200
1
Week 1 - Interactive
Assignment.docx
CPT 200
2
CPT200_Week_4_Interact
ive_Assignment
CPT 200
2
Week 4 - Discussion.docx
CPT 200
2
Related Q&A
Use a basic list structure to enhance
Functionality 1 that you developed in Week 1. You
should allow users to enter information for Kve…
Q&A
The colors red, blue, and yellow are known as
the primary colors because they cannot be made
by mixing other colors. When you mix two…
Q&A
For this interactive assignment, apply all the
concepts learned in previous weeks and apply
the use of sequential input and output…
Q&A
Currently working on CPT 200 week 5
interactive assignment 1 but when I hit run I get
an error. answerkey = ['B', 'D', 'A', 'A', 'B', 'A', 'B',…
Q&A
The Final Project for this course is an
accumulation of previous weeks' assignments in
which you will utilize all of the skills you have…
Q&A
For this interactive assignment, apply all the
concepts learned in previous weeks and apply
the use of sequential input and output…
Q&A
Other related materials
Week 4 Assignment
CPT200.docx
CPT 200
7
Week 3_Assignment
Functionality 3.docx
PROGRAMMIN 104
5
Week 5 Final Project
CPT200.docx
CPT 200
8
Employee Management
System-F2.docx
CPT 200
5
Employee Management
System - Functionality…
2.docx
CS CPT200
4
CPT200_Week3Assignme
nt
CPT 200
5
Related Textbook Solutions
College Algebra
Sullivan
TEXTBOOK
Precalculus
Miller/Gerken
TEXTBOOK
College Algebra &
Trigonometry
Miller/Gerken
TEXTBOOK
Prealgebra
Miller
TEXTBOOK
Prealgebra &
Introductory
Algebra
Miller
TEXTBOOK
Developmental
Mathematics:
Prealgebra,
Beginning Algebr…
& Intermediate
Miller
TEXTBOOK
Recently submitted questions
What proportion (i.e., what is the probability) of
events of HT (i.e., heads then tails) would you
expect to Knd in the sample space for the…
Q&A
Newly uploaded documents
japan.docx
MANAGEMENT ORGANIZATI
4
Company
About Us
Careers
Leadership
Q&A Archive
Educator Events
Get Course Hero
iOS
Android
Chrome Extension
Tutors
Study Tools
AI Homework Help
Flashcards
Grammar Checker
Paraphraser
Proofreader
Spell Checker
Help
Contact Us
FAQ
Feedback
Legal
Copyright Policy
Academic Integrity
Our Honor Code
Privacy Policy
Terms of Use
Attributions
Do Not Sell or Share My
Personal Info
Connect with Us
College Life
Facebook
Twitter
LinkedIn
YouTube
Instagram
Course Hero, a Learneo, Inc. business
Course Hero is not sponsored or endorsed by any
college or university.
View full document
page
2
of 4
Professor Amjad Alkilani Student: Christopher Larson -2020
CPT 200 Week 2 Assignment Employee Management System – Functionality 2 I started with an empty list called employees and a static integer of 5. The while loop iterates through adding employee traits to variables and storing them in a separate list. I then add that list to the employees list, essentially creating a list of lists and then decrement the static integer before going through the loop again until the integer is 0. I then enter a loop looking for an inputted value to be ‘q’ or ‘Q’ and if it is not then I look for a valid index between 1 and 5 to lookup the employee information. However, because list indexes start at 0 I have to subtract 1 from the entered lookup integer to get the correct index. If an incorrect index is entered, for example 6, then an error message is displayed and the user must input another number or exit the program with ‘q’ or ‘Q’. If a correct index is entered then the
View full document
View full document
See more
See more
Scroll to top
Ask 5 Free Questions
Limited time only!
Search
Log in
Join
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
File
Edit
View
History
Bookmarks Profiles Tab Window
Help
Post Attendee - Zoom
in Short Answer Quiz B (15%) (p X
O Launch Meeting - Zoom
A moodle.koi.edu.au/moodle/mod/quiz/attempt.php?attempt=608964&cmid%3D160615&page%=2
KOI E-Learning
Library Academic
KOI
Student
Teachers' Contact
A.
Calendar
Website
Portal
List
3 Cloud Computing T122
ourses / ICT373_0122 / General / Short Answer Quiz B (15%)
What are the two categories of security
Answer:
arrow_forward
Write 1-2 write up. With at least 3 references.1. Create a technology plan for your NAB Company using the template in thetext as a guide (p. 227 | Technology Plan Preparation Form). Extractappropriate information from the NAB Company portfolio, where applicable.Other required items in the template should be filled in using your personalpreferences.SOFTWARE NEEDS: (Specify âon premise and âin the cloudâ):- Accounting, Customer relationship management, Inventory management, office suit,custom softwareHARDWARE NEEDS:- Servers, Backup systems, Networking, PeripheralsTELECOMMUNIACATION- Telephone system Mobile phones.CONSULTING PERSONNEL- Systems design/maintenance- Tech support/Help desk2. Provide a rationale for the personnel needs section by incorporatingappropriate functional-level strategies.o Hints: Consider the type of technology your company will use toconduct the following activities:o 1. Manage personnel; take, fulfill, and track…
arrow_forward
Project detail:Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption.Project Part 2Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g.,…
arrow_forward
For displaying your idea and thoughts for a presentation which view you will use in MS PowerPointSelect one:a. Slide Sorter Viewb. Slide sorter Viewc. Normal Viewd. Outline View
arrow_forward
Write an SQL query to display:
The last name of the student who registered at the last.
K
Your output should contain 1 column in the below-mentioned order.
last_name
arrow_forward
Instructions:
• Assignment to be completed on an individual basis.
• Open a new word document
Save as 60#######-Assignment 1
•
Save as a word document any other format will not
be marked.
• Answers are to be in complete sentences.
Turnitin® will be applied to all uploads to the
"Dropbox" of D2L.
• Each short answer question should have a minimum
of 250 words.
• All citations must be in APA Formato If your paper
does not contain any citations, your assignment will
receive a grade of '0'
• Assignment is to include a Cover Page, Table of
Contents, Body and Reference Page.
• Minimum of one external (NOT class PowerPoints)
reference per answer. You can also use class
PowerPoints to support your answers but you must
reference them.
T
P
Part B - Word Processing
Br
F
Research and discuss two advanced word processing features NOT covered in class that can
be used to increase productivity. Explain how they would help someone be able to do more
work.
CHEE AN
Question 2
arrow_forward
Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are
encouraged) in PDF format through Blackboard using the following file name format:
LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten.
All the assignments in this course are individual work; any overlap between assignment reports will be
penalized.
A bank requires for their customers to access their online banking accounts to provide as
User Id (or user name) the last 8 digits of their bank card number, and a password with a
length between 8 and 12 ASCII characters, including the following restrictions (posted on
their website):
Passwords must have at least 8 characters long and at most 12 characters long, and must include at least
one character from each of the following four character types:
Upper case letters ABC DEF
Lower case letters ghijkl
Numbers 1 2 345 67890
Special characters ! @ # $ % ^ & * (+) = -
The remaining characters of the password must be selected…
arrow_forward
You will use a word document for the following list .In Real time chat web Application we have a feature called Create/Delete and Join/Leave groups .with this following Information we need Requirement Table and User story
arrow_forward
Freeze Panes so the first row containing column headings (Row 5) on the Support Calls worksheet will remain static when scrolling. Ensure that Rows 1-4 are visible.
How do I freeze panes in excel?
arrow_forward
Matching Drag the letter from the list on the right to its matching term in the list on the left. When you are finished, click Done. Input message Invalid data .xltx Data validation Template Red ellipse VBA Version history Comment Shared workbook The process of matching data with specifications as the data is entered A data validation comment box that appears in an active cell before an entry is made Without this, individual copies of a shared workbook cannot be combined This marks invalid data in a range with validation settings. Programming language that expands the abilities of Excel Data that does not conform to the validation criteria An element in a threaded conversation in a workbook A sample workbook
arrow_forward
CClever | Portal
S Schoology
+
pols.schoology.com/common-assessment-delivery/start/5581281107?action=onresume&submissionId=871120828
epic
COURSES GROUPS RESOURCES GRADES
Checkpoint 2.2
In the
✓ menu, the user will find features such as spelling and word count.
View
Insert
Tools
Table
ish
a
F
POSSIBLE
◄ 12
Support | Schoology Blog | PRIVACY POL
arrow_forward
Question 2
You have been provided with a QTCreator
project called Project13 _ Student. Open the
project in QTCreator and make the necessary
changes to the main.cpp file. You have been
provided with file named Data.txt. Data.txt
contains information about students. Each line
contains the information for one student.
Data.bt - Notepad
File Edit Format View Help
Name, Surname, Email,Age,StudentNumber
Tobias, Chambers,Tobia.CHAMB5651@mail2web.com,18,321068734
Santiago,Ortiz,Santiago.ORT7636@yahoo.com, 23,2560830790
Bristol, Ayers, Bristol.AYE5400@mail2web.com,29,0676653730
Annie, Kane, Annie. KAN3627@hushmail.com,19,0444202990
Rosemary, Bryant,Rosem.BRY8313@gmail.com, 20,785505493
arrow_forward
• Assignment to be completed on an individual basis.
• Open a new word document
Save as 60#######-Assignment 1
• Save as a word document any other format will not
be marked.
•
Answers are to be in complete sentences.
Turnitin® will be applied to all uploads to the
"Dropbox" of D2L.
• Each short answer question should have a minimum
of 250 words.
. All citations must be in APA Format o If your paper
does not contain any citations, your assignment will
receive a grade of '0'
• Assignment is to include a Cover Page, Table of
Contents, Body and Reference Page.
• Minimum of one external (NOT class PowerPoints)
reference per answer. You can also use class
PowerPoints to support your answers but you must
reference them.
Pa
F-
al
0
Part B Word Processing
Re-
PIC
Question 1
question 1
Discuss the history & evolution of Word Processing.
Hala ba
arrow_forward
Based on the guidelines .. related to the forms and report, you need to design a form that is used to generate a certificate and then you need to design the certificate itself that represent the report. The certificate should include a logo for your university, your name, date issued, your faculty, department, tables contains list of courses marks. Moreover, the colors here are so important.
Note: you need to build your own form and report, do not copy it or download it from google. You can use any tool you want such as word, paint, etc…
arrow_forward
11 For displaying your idea and thoughts for a presentation which view you will use:
Select one:
a. Normal View
b. Outline View
c. Slide Sorter View
d. Slide sorter View
arrow_forward
___ 7 Add user: Joe Cool to groups student and staff. Highlight and right click user to do this.
Add user: student1 to group student. Add user: teacher1 to group faculty. Document these steps
arrow_forward
You have been contracted by a local pizza restaurant, Pizza Byte, to create an online form to allow customers to order pizza online and to be delivered to a specified location. creating a website. This will include the form to submit the order, the processing of the order and the display of an order receipt.
Form:
The owner of the restaurant has given you a mock-up of how he thinks the site should look like:
There should be restraints on the data that is entered into the form. Once the form is submitted, all of the data should be checked to make sure it is valid. I will be using a different script to insert invalid information to check this. If there are any errors, the form should be redisplayed with any valid data already filled in. Once that data has been validated an order receipt for the order should be displayed.
Create PHP script file(s) for the form the entry of the order and redisplay of the order information and the display of the receipt:
Create a script that…
arrow_forward
Question 16 Rk .Do not plagiarize please, also kindly include references.
Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
arrow_forward
NUSRA SAEED A.KARIM A-
References
Mailings
Review
View
Help
Tell me what you want to do
-AA Aa-
21 T
AABBCCD AaBbCcD AaBbC AABBCCC AaE
A - - A-
T Normal T No Spac. Heading 1 Heading 2
Title
Paragraph
Styles
Draw a flow chart to print the multiplication table of 3
using the format i*3=3 where i varies from 1 to 10.
tes)
del
prt sc
ho
144
40
arrow_forward
PLZ help with the following:
Open Event Viewer in the Administrative Tools group or by using the command msc.To see events , select a log in left pane and then drill down into subcategories for this logs.
To sort a list of events, click a column heading in the middle pane. After you have selected an event, click the Details tab to show more information about the event. Error events are the most important and indicate that something went wrong with the system. Warnings events indicate failure might occur in the future, and Critical events indicate a problem occurred with a critical Windows process.
arrow_forward
Question 1:
Assume that you are going to create a spreadsheet template for the monthly supply order. Use Ms Excel to create the worksheets according to the following requirements.
Open a new work book. Rename Sheet1 tab to “Suppliers”. This worksheet should include three tables (one for each supplier) Consisting of the Items and Price. Rename Sheet2 tab to “Flower Stalks Gallery”. This worksheet should include Flower Types (default values: Rose, Carnation, and Statice), Blue Stalks (default values: N/A for Rose and Carnation, 0 for Statice), Pink Stalks (default values: 0 for Rose, Carnation, and Statice), Purple Stalks (default values: N/A for Rose, and 0 for Carnations and Statice), Red Stalks (default values: 0 for Rose and Carnation, and N/A for Statice), White Stalks (default values: 0 for Rose, Carnation, and Statice), and Yellow Stalks (default values: N/A for Rose, and 0 for Carnation and Statice). Rename Sheet3 tab to “Gifts Accessories Supply”. This worksheet should…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- File Edit View History Bookmarks Profiles Tab Window Help Post Attendee - Zoom in Short Answer Quiz B (15%) (p X O Launch Meeting - Zoom A moodle.koi.edu.au/moodle/mod/quiz/attempt.php?attempt=608964&cmid%3D160615&page%=2 KOI E-Learning Library Academic KOI Student Teachers' Contact A. Calendar Website Portal List 3 Cloud Computing T122 ourses / ICT373_0122 / General / Short Answer Quiz B (15%) What are the two categories of security Answer:arrow_forwardWrite 1-2 write up. With at least 3 references.1. Create a technology plan for your NAB Company using the template in thetext as a guide (p. 227 | Technology Plan Preparation Form). Extractappropriate information from the NAB Company portfolio, where applicable.Other required items in the template should be filled in using your personalpreferences.SOFTWARE NEEDS: (Specify âon premise and âin the cloudâ):- Accounting, Customer relationship management, Inventory management, office suit,custom softwareHARDWARE NEEDS:- Servers, Backup systems, Networking, PeripheralsTELECOMMUNIACATION- Telephone system Mobile phones.CONSULTING PERSONNEL- Systems design/maintenance- Tech support/Help desk2. Provide a rationale for the personnel needs section by incorporatingappropriate functional-level strategies.o Hints: Consider the type of technology your company will use toconduct the following activities:o 1. Manage personnel; take, fulfill, and track…arrow_forwardProject detail:Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption.Project Part 2Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g.,…arrow_forward
- For displaying your idea and thoughts for a presentation which view you will use in MS PowerPointSelect one:a. Slide Sorter Viewb. Slide sorter Viewc. Normal Viewd. Outline Viewarrow_forwardWrite an SQL query to display: The last name of the student who registered at the last. K Your output should contain 1 column in the below-mentioned order. last_namearrow_forwardInstructions: • Assignment to be completed on an individual basis. • Open a new word document Save as 60#######-Assignment 1 • Save as a word document any other format will not be marked. • Answers are to be in complete sentences. Turnitin® will be applied to all uploads to the "Dropbox" of D2L. • Each short answer question should have a minimum of 250 words. • All citations must be in APA Formato If your paper does not contain any citations, your assignment will receive a grade of '0' • Assignment is to include a Cover Page, Table of Contents, Body and Reference Page. • Minimum of one external (NOT class PowerPoints) reference per answer. You can also use class PowerPoints to support your answers but you must reference them. T P Part B - Word Processing Br F Research and discuss two advanced word processing features NOT covered in class that can be used to increase productivity. Explain how they would help someone be able to do more work. CHEE AN Question 2arrow_forward
- Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are encouraged) in PDF format through Blackboard using the following file name format: LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten. All the assignments in this course are individual work; any overlap between assignment reports will be penalized. A bank requires for their customers to access their online banking accounts to provide as User Id (or user name) the last 8 digits of their bank card number, and a password with a length between 8 and 12 ASCII characters, including the following restrictions (posted on their website): Passwords must have at least 8 characters long and at most 12 characters long, and must include at least one character from each of the following four character types: Upper case letters ABC DEF Lower case letters ghijkl Numbers 1 2 345 67890 Special characters ! @ # $ % ^ & * (+) = - The remaining characters of the password must be selected…arrow_forwardYou will use a word document for the following list .In Real time chat web Application we have a feature called Create/Delete and Join/Leave groups .with this following Information we need Requirement Table and User storyarrow_forwardFreeze Panes so the first row containing column headings (Row 5) on the Support Calls worksheet will remain static when scrolling. Ensure that Rows 1-4 are visible. How do I freeze panes in excel?arrow_forward
- Matching Drag the letter from the list on the right to its matching term in the list on the left. When you are finished, click Done. Input message Invalid data .xltx Data validation Template Red ellipse VBA Version history Comment Shared workbook The process of matching data with specifications as the data is entered A data validation comment box that appears in an active cell before an entry is made Without this, individual copies of a shared workbook cannot be combined This marks invalid data in a range with validation settings. Programming language that expands the abilities of Excel Data that does not conform to the validation criteria An element in a threaded conversation in a workbook A sample workbookarrow_forwardCClever | Portal S Schoology + pols.schoology.com/common-assessment-delivery/start/5581281107?action=onresume&submissionId=871120828 epic COURSES GROUPS RESOURCES GRADES Checkpoint 2.2 In the ✓ menu, the user will find features such as spelling and word count. View Insert Tools Table ish a F POSSIBLE ◄ 12 Support | Schoology Blog | PRIVACY POLarrow_forwardQuestion 2 You have been provided with a QTCreator project called Project13 _ Student. Open the project in QTCreator and make the necessary changes to the main.cpp file. You have been provided with file named Data.txt. Data.txt contains information about students. Each line contains the information for one student. Data.bt - Notepad File Edit Format View Help Name, Surname, Email,Age,StudentNumber Tobias, Chambers,Tobia.CHAMB5651@mail2web.com,18,321068734 Santiago,Ortiz,Santiago.ORT7636@yahoo.com, 23,2560830790 Bristol, Ayers, Bristol.AYE5400@mail2web.com,29,0676653730 Annie, Kane, Annie. KAN3627@hushmail.com,19,0444202990 Rosemary, Bryant,Rosem.BRY8313@gmail.com, 20,785505493arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- COMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage