Premium Essay

Unit 2 Research Assignment

In: Computers and Technology

Submitted By wdfifty
Words 477
Pages 2
Research Assignment
Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to bytecode (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture.

Strengths:WORA, popularity
Weaknesses: Slower than natively compiled languages

Sample syntax:

class HelloWorldApp { public static void main(String[] args) {
System.out.println("Hello World!");
}
}

C++ is a programming language that is general purpose, statically typed, free form, multi-paradigm and compiled. It is regarded as an intermediate-level language, as it comprises both high-level and low-level language features. Developed by Bjarne Stroustrup starting in 1979 at Bell Labs, C++ was originally named C with Classes, adding object oriented features, such as classes, and other enhancements to the C programming language. The language was renamed C++ in 1983, as a pun involving the increment operator.

Strengths:Speed
Weaknesses: Older and considered clumsy if compared to Java

Sample syntax:

#include using namespace std; void main(){ cout << "Hello World!";
}

C# is a multi-paradigm programming language encompassing strong typing, imperative, declarative, functional, procedural, generic, object-oriented (class-based), and component-oriented programming disciplines. It was developed by Microsoft within its .NET initiative and later approved as a standard by Ecma (ECMA-334) and ISO (ISO/IEC 23270:2006). C# is one of the programming languages designed for the Common Language Infrastructure.…...

Similar Documents

Free Essay

Unit 2 Research Asignment 2

...Unit 3 Research Assignment I’d say that the SQL Server database-naming convention makes the most sense to me. The database name accurately reflects the database content and all database names must be prefixed with the originating components acronym. The file names match the database name and the table names should accurately reflect the table’s content and function. Each column name must be unique within its table. Guidelines and best practices should be followed as a general rule, but it is understood that exception situations may exist. Developers must be prepared to provide a justification for any exceptions. There are no right and wrong answers for naming conventions as far as I am concerned. It’s all down to factors such as existing naming conventions in your applications and personal preference. I think the most important rule to adhere to is to be consistent. People may argue about whether to have underscores in object names or whether you should have proper case but it doesn't really matter as long as everything adheres to the same set of rules. If you have an existing set of objects then I'd suggest trying to match what is already in place. Of course, it’s also good to ensure names are logical! Also called an entity-relationship (ER) diagram, a graphical representation of entities and their relationships to each other, typically used in computing in regard to the organization of data within databases or information systems. An entity is a piece of data-an......

Words: 474 - Pages: 2

Free Essay

Unit 2 Assignment 1 Disk Redundancy Research

...Assignment Title Unit 2. Assignment 1. Disk Redundancy Research Assignment Overview: Using the Internet and the ITT Tech Virtual Library, research the following questions, and provide your thoughts on each one. Submit your answers in a Word Document and ensure that you cite any resources you utilized with the proper APA format. 1. What does RAID stand for? RAID stands for Redundant Array of Inexpensive Disks 2. When would we use RAID? 3. Define the following types of RAID: a.RAID 0: Striped Set -- A RAID 0 setup splits data evenly across two or more disks. It is important to note that RAID 0 was not one of the original RAID levels, and is not redundant. If one drive goes down your server will need to be restored from backup b. RAID 1 Mirrored Set -- A Raid 1 setup creates an exact copy (or mirror) of data on two or more disks. A typical setup just has two drives that are setup to mirror data. If one drive goes down your server will still be functional until a scheduled drive replacement can be installed. c. RAID 5 Striped Set with Parity -- A RAID 5 setup uses block-level striping with parity data distributed across all disks in the RAID Array. This means you can have one drive fail and your server will remain functional until a scheduled drive replacement can be installed. RAID 5 also increases read/write speeds while using the available disk space efficiently. d. RAID 6 Similar to RAID 5 but not as widely used, RAID 6 performs either two parity......

Words: 422 - Pages: 2

Free Essay

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active......

Words: 257 - Pages: 2

Free Essay

Unit 2 Assignment 1: Disk Redundancy Research

...Unit 2 Assignment 1: Disk Redundancy Research December 14, 2013 1) What does RAID stand for? RAID stands for? RAID stands for Redundant Array of Independent Disks. 2) When would we use RAID? RAID can be used by either individual users or large network users to store data across multiple locations to increase fault tolerance. 3) Define the following types of RAID: a) RAID 0 b) RAID 1 c) RAID 5 d) RAID 6 RAID 0 | Strips data without redundancy. Provides faster performance, but it lacks fault tolerance. | RAID 1 | Known as disk mirroring. This method doesn’t strip data, it saves all data intact across at least two disks to provide fault tolerance. | RAID 5 | Uses rotating parity to store data. There is do data duplication, but the parity data can be used to reconstruct data. Mostly used by large organizations for data that is not performance sensitive. | RAID 6 | Same as RAID 5, but adds another parity scheme to increase fault tolerance. | 4) Why is RAID 0 of any use if it offers no redundancy? RAID 0 allows data to be broken up in order to allow faster access to data. 5) Why do you think that RAID 1 can be the most expensive? Why would people utilize it if it’s so costly? RAID 1 can be the most expensive because it requires an entire drive to make a duplicate of any data and the more copies you want, the more drives you need. People still use is because it makes complete copies of data, not partial ones. The complete copies allow......

Words: 405 - Pages: 2

Free Essay

Unit 2 Assignment 2

...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new......

Words: 427 - Pages: 2

Premium Essay

Unit 2 Research Assignment

...Unit 2 Research Assignment 1 Chris Stephens ITT Technical Institute PT1420 Introduction to Programming Mr. Chamberlin April 1, 2014 Researching Variable Naming Rules The variable naming rules for Visual Basic, Python, and Java have many different facets to them. These are the most common and most used programming languages in use today. Over the years these languages have become more user-friendly and easier to comprehend to write programs. Visual Basic is most used in introductory program writing and common for students’ first learning of programming. Some of the naming rules for Visual Basic are: the first character of the name must be a letter, you can’t use a space, period, exclamation point, or these special characters - &, @, $, or # in the name, the name cant’ exceed 255 characters in length, and Visual Basic isn't case-sensitive, but it preserves the capitalization in the statement where the name is declared. (Microsoft, 2014) Python provides a special process called the PEP process, short for Python Enhancement Process for changes proposed to Python. (University, 2014) Some of the naming rules for Python are as follows : indentation should be done using four spaces per indentation level, lines should be less than 80 characters as compared to Visual Basic and its use of a maximum of 255 characters, and lines that get too long should be aligned in a “reasonable” fashion, for example aligned with an open delimiter and at a......

Words: 625 - Pages: 3

Premium Essay

Mba 5652 Unit 2 Assignment Components of Research Proposal

...Research Proposal for the Application of Positive Psychology in Training Trainers Introduction Schooling for a number of is a far accomplishment venture. In its most central appearance in America, a individual is expectant to go to at least 12 years of education. Conventional student depart the instructive organization in their belatedly adolescences and either get on an didactic or vocation path, but still as grown-ups they meet many chance for education. University bound scholars choose for at least four or additional years at the university, while others look for work. Many businesses employ company instructors or Human Resources to carry out small training actions in the form of courses or career skills education. Even today’s jobless grown-ups are uncovered to edifying chances in local service place of work or from community support agencies. “In any of these face to face scenarios, a trainer, teacher or facilitator is needed. The trainer’s role in educating adults can encompass many different areas including encouraging growth, assisting adults with problems, preparing adults for current or future work activities or assisting organizations with achieving change” (Caffarella, 2002). Instructors are observation by agenda contributor as topic substance specialist. As such, the teachers has a liability to make a knowledge setting that will make sure accomplishment for grown-up student. Coaches should also be recognizable with chief ideology of grown-up......

Words: 1861 - Pages: 8

Premium Essay

Nt1210 Unit 2 Assignment 2

...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic......

Words: 483 - Pages: 2

Premium Essay

Unit 2 Research Assignment

...Unit 2 Assignment: Research 1. What are the variable naming rules of Visual Basic, Python, and Java? * Visual Basic requires you to use a letter as your first character. You are unable to use spaces, periods, exclamation marks, and other special characters within the name, consisting of: @, &, $, #. The name also can’t exceed 255 characters. You can’t repeat the same names within the same level of scope. There’s also a few other minor rules to follow as well. * Python allows you to use either a letter or underscore character as the first character in a line. You can use an unlimited amount of letter, numbers, or underscore characters following that. Python is also case sensitive and therefore makes upper and lower case characters important. Any digit number will work including and between the numbers 0 through 9. * Java can use Unicode letters, digits, and two special characters such as an underscore and dollar sign. Java is also case sensitive. A variable’s name can be any legal identifier. The length of a variable name can also be any number. The beginning variable can consist of either letters or underscore characters. White space isn’t permitted, special characters aren’t allowed, and digits cannot be used at the start. Subsequent characters are able to be letters, digits, dollar signs, or underscore characters. Finally, variable names must not be a keyword or reserved word. 2. List three similarities and differences between the three......

Words: 337 - Pages: 2

Premium Essay

Pt1420 Unit 2 Research

...Kelli Okuly PT1420 Unit 2 Research Assignment 12-5-2014 Variable naming conventions vary from program to program. In Visual Basic the variable must begin with a letter and you cannot use a space, period (.), or the characters !, @, &, $, # in the name. Visual Basic variable names must be under 255 characters long. You shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use a basic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the fundamental function, statement, or method name with the name of the associated type library. For example, if you have a variable called “Left”, you can only use the “Left” function using “VBA.Left”. In Python, variables must begin with a letter or underscore (_). Other characters can be letters, numbers, or the underscore. Python variables are case sensitive and can be any length, within reason. There are several keywords in Python that are reserved for other functions and cannot be used as variables. For example; print, def, from, not, and return. Variables in Java are referred to as Identifiers. In Java the variable must begin with a letter, an underscore, or a dollar sign ($) although a letter is typically what is used. The other characters may be letters or numbers, no spaces or special characters are allowed. Java identifiers can be any length......

Words: 405 - Pages: 2

Free Essay

Unit 2 Homework and Research

...Unit 2 Homework and Research Marsha Moore Intro to Programming Short Answer Questions 1-4 1. Learn what the customer wants. Determine the steps that must be taken to perform the task, and create an algorithm or step-by-step directions to solve the problem. 2. A pseudocode is a fake code used as a model for programs. 3. Receive input; some process is performed on input; output is produced. 4. “User friendly”: programs that are easy to use. Algorithm Workbench Review Questions 1. Declare height Display “Enter your height” Input height 2. Declare color Display “Enter your favorite color” Input color Program Exercise 1 Console.Write (“Enter your name: “) name = Console.ReadLine () Console.Write (“Enter your address, city, state, and zip: “) AddressCityStateZip = Console.ReadLine () Console.Write (“Enter your telephone number: “) TelephoneNum = Console.ReadLine () Console.Write (“Enter your college major: “) Major = Console.ReadLine () Program Exercise 2 Dim Product As String = “NO VALUE” Dim prodPrice As Double = 0 Dim Subtotal As Double = 0 Dim salesTax As Double = 0 Dim TotalPrice As Double = 0 Console.Write (“Enter product: “) Product = Console.ReadLine () Console.Write (“Enter product price: “) prodPrice = Console.ReadLine () Subtotal = prodPrice + prodPrice + prodPrice + prodPrice + prodPrice salesTax = Subtotal * 0.06 TotalPrice = Subtotal + salesTax Visual Basic (www.virtulalparkland.edu) * Unique within the......

Words: 401 - Pages: 2

Free Essay

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Free Essay

Unit 16 Assignment 2

...BTEC LEVEL 3 EXTENDED DIPLOMA IN UNIFORMED PUBLIC SERVICE ASSIGNMENT BRIEF Student Name: Chelsee Fagan Tutor Name: Unit Number & Name: 16 Career Planning for the Public Service Launch Date: 20 April 2015 Hand in Date: 1 June 2015 Learning Outcome & Criteria Covered: LO 2, P3, P4, P5, M1, D1 ASSIGNMENT TITLE: Skills & Application No.: 2/2 | | ASSIGNMENT SCENARIO: As a perspective interviewee you need to identify different skills and qualities, carry out a skills audit and complete an application for a public service job... | | TASKS: Produce the following for a pass (in regular BLACK font):P3 identify the different skills and qualities required for a given public service role * record where you have demonstrated any of the identified skills, For example during your College Course, employment or voluntary work.P4 carry out a personal skills audit for a given public service role * create and complete a personal skills audit specific to a public uniformed service jobP5 complete an application for a role in a specific public service. * Agree with your tutor the role that you wish to apply for. * Provide a calendar of events with achievable dates for each step of application process * complete the application process for your chosen public service role. For example, an application for a role in the prison......

Words: 1724 - Pages: 7

Free Essay

Unit 2 Assignment 2

...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves......

Words: 598 - Pages: 3

Premium Essay

Unit 2 Assignment 2

...Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced labour -Right to a fair trial -No punishment without law -Respect for your private and family life, home and correspondence -Freedom of thought, belief and religion -Freedom of expression -Freedom of assembly and association -Right to marry and start a family -Protection from discrimination in respect of these rights and freedoms -Right to peaceful enjoyment of your property -Right to education -Right to participate in free elections This act promotes anti discriminatory practice in a way that it gives everyone the rights they deserve which can’t be taken away from anyone, therefore everyone is equal in what they can do. Data protection act- The data protection act defines UK laws on processing data on identifiable living people. It covers any data which can identify a person such as address, name, Humber, email, information is to be used fairly and lawfully. It is only used for limited specific purposes and in a way that is relevant, adequate and excessive. This promotes anti discriminatory practice as it helps protect......

Words: 4206 - Pages: 17