
Discovering Computers ©2016 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305391857
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Jennifer T. Campbell, Mark Frydenberg
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 4, Problem 6CT
Program Plan Intro
Software:
- Software is also called as
programs . Software contains collection of programs that are used by end users. - It is also called as an “application” or simple an “app”.
- Software performs various tasks, functions and activities that benefit the user.
Expert Solution & Answer

Trending nowThis is a popular solution!

Students have asked these similar questions
Big State University
The Big State University course catalog reads as follows: "To enroll in MIS 260, which is an advanced
course, a student must complete two prerequisites: MIS 120 and MIS 222. A student who completes
either one of these prerequisites and obtains the instructor's permission, however, will be allowed to
take MIS 260."
Tasks
1. Create a decision table that describes the Big State University course catalog regarding eligibility for
MIS 260. Show all possible rules.
2. Simplify the table you just created. Describe the results.
3. Draw a simplified decision tree to represent the Big State University catalog. Describe the results.
4. Why might you use a decision tree rather than a decision table?
What is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?
#include
int main (void)
{
int i, *p, count
}
p
=
&count;
= 10%;
for (i = 5; i >= 0; i--) {
count++;
(*p) ++;
}
printf("count
return 0;
=
%d, Have a wonderful day.\n", count);
1. [20 pts] What is the output of the program? Please explain why.
2. [15 pts] What is the gdb command to set a breakpoint in line 6 (p
=
&count;)?
3. [15 pts] Explain in your own words how the [break.
need to use such command?
...
if expr] command works. When might you
Chapter 4 Solutions
Discovering Computers ©2016 (Shelly Cashman Series) (MindTap Course List)
Ch. 4 - Prob. 1SGCh. 4 - Prob. 2SGCh. 4 - Prob. 3SGCh. 4 - Prob. 4SGCh. 4 - _____ software performs functions specific to a...Ch. 4 - Prob. 6SGCh. 4 - List any restrictions for shareware, freeware,...Ch. 4 - Prob. 8SGCh. 4 - Prob. 9SGCh. 4 - Prob. 10SG
Ch. 4 - Prob. 11SGCh. 4 - Prob. 12SGCh. 4 - Prob. 13SGCh. 4 - Prob. 14SGCh. 4 - Prob. 15SGCh. 4 - Prob. 16SGCh. 4 - Prob. 17SGCh. 4 - Prob. 18SGCh. 4 - Prob. 19SGCh. 4 - Prob. 20SGCh. 4 - Prob. 21SGCh. 4 - Prob. 22SGCh. 4 - Prob. 23SGCh. 4 - Prob. 24SGCh. 4 - Prob. 25SGCh. 4 - Prob. 26SGCh. 4 - Prob. 27SGCh. 4 - Prob. 28SGCh. 4 - Prob. 29SGCh. 4 - Prob. 30SGCh. 4 - Prob. 31SGCh. 4 - Prob. 32SGCh. 4 - Prob. 34SGCh. 4 - Prob. 35SGCh. 4 - Prob. 36SGCh. 4 - Prob. 37SGCh. 4 - Prob. 38SGCh. 4 - Prob. 39SGCh. 4 - Prob. 40SGCh. 4 - Prob. 41SGCh. 4 - Prob. 42SGCh. 4 - Prob. 43SGCh. 4 - Prob. 44SGCh. 4 - Prob. 45SGCh. 4 - Prob. 46SGCh. 4 - Prob. 47SGCh. 4 - Prob. 48SGCh. 4 - Prob. 49SGCh. 4 - Prob. 1TFCh. 4 - Prob. 2TFCh. 4 - Prob. 3TFCh. 4 - Prob. 4TFCh. 4 - Prob. 5TFCh. 4 - Prob. 6TFCh. 4 - Prob. 7TFCh. 4 - Prob. 8TFCh. 4 - Prob. 9TFCh. 4 - Prob. 10TFCh. 4 - Prob. 11TFCh. 4 - Prob. 12TFCh. 4 - Prob. 1MCCh. 4 - Prob. 2MCCh. 4 - Prob. 3MCCh. 4 - Prob. 4MCCh. 4 - Prob. 5MCCh. 4 - Prob. 6MCCh. 4 - Prob. 7MCCh. 4 - Prob. 8MCCh. 4 - Prob. 1MCh. 4 - Prob. 2MCh. 4 - Prob. 3MCh. 4 - Prob. 4MCh. 4 - Prob. 5MCh. 4 - Prob. 6MCh. 4 - Prob. 7MCh. 4 - Prob. 8MCh. 4 - Prob. 9MCh. 4 - Prob. 10MCh. 4 - Prob. 2CTCh. 4 - Prob. 3CTCh. 4 - Prob. 4CTCh. 4 - Prob. 5CTCh. 4 - Prob. 6CTCh. 4 - Prob. 7CTCh. 4 - Prob. 8CTCh. 4 - Prob. 9CTCh. 4 - Prob. 10CTCh. 4 - Prob. 11CTCh. 4 - Prob. 12CTCh. 4 - Prob. 13CTCh. 4 - Prob. 14CTCh. 4 - Prob. 15CTCh. 4 - Prob. 16CTCh. 4 - Prob. 17CTCh. 4 - Prob. 18CTCh. 4 - Prob. 19CTCh. 4 - Prob. 20CTCh. 4 - Prob. 21CTCh. 4 - Prob. 22CTCh. 4 - Prob. 23CTCh. 4 - Prob. 24CTCh. 4 - Prob. 25CTCh. 4 - Prob. 26CTCh. 4 - Prob. 27CTCh. 4 - Prob. 28CTCh. 4 - Prob. 29CTCh. 4 - Prob. 30CTCh. 4 - Prob. 1PSCh. 4 - Prob. 2PSCh. 4 - Prob. 3PSCh. 4 - Prob. 4PSCh. 4 - Prob. 5PSCh. 4 - Prob. 6PSCh. 4 - Prob. 7PSCh. 4 - Prob. 8PSCh. 4 - Prob. 9PSCh. 4 - Prob. 10PSCh. 4 - Prob. 1.1ECh. 4 - Prob. 1.2ECh. 4 - Prob. 1.3ECh. 4 - Prob. 2.1ECh. 4 - Prob. 2.2ECh. 4 - Prob. 2.3ECh. 4 - Prob. 3.1ECh. 4 - Prob. 3.2ECh. 4 - Prob. 3.3ECh. 4 - Prob. 4.1ECh. 4 - Prob. 4.2ECh. 4 - Prob. 4.3ECh. 4 - Prob. 5.1ECh. 4 - Prob. 5.2ECh. 4 - Prob. 5.3ECh. 4 - Prob. 1IRCh. 4 - Prob. 2IRCh. 4 - Prob. 4IRCh. 4 - Prob. 2CTQ
Knowledge Booster
Similar questions
- Please run and debug the following program and answer the questions.arrow_forward(OnlineGDB) #include <stdio.h>int main(void) {int a;char *s;int v0 = 4, v1 = 5, v2 = 6, v3 = 1, v4 = 2;printf("Exercise 1:\n====================\n");switch(v0) {case 0: printf("Hello October\n"); break;case 1: printf("Go Kean!\n"); break;case 2: printf("Academic Building Center \n"); break;case 3: printf("UNION \n"); break;case 4: printf("Go ");case 5: printf("Kean! \n");default: printf("Have a great semester! \n"); break;}for(a=5; a<v1; a++) {printf("Kean");}printf("\n");if (v2 == 6) {s = "Go";}else {s = "Hello";}if(v3 != v4) {printf("%s Kean!\n",s);} else {printf("%s Computer Science!\n",s);}return 0;} Assume the following codes are added between line 36 (}) and line 38 (return 0;) v0>0 ? ++v1, ++v2 : --v3; Please give the values of v0, v1, v2, v3, and v4 after this line and explain the reason. You can test the program to verify your answer if you like.arrow_forward#include <stdio.h>int main(void) {int a;char *s;int v0 = 4, v1 = 5, v2 = 6, v3 = 1, v4 = 2;printf("Exercise 1:\n====================\n");switch(v0) {case 0: printf("Hello October\n"); break;case 1: printf("Go Kean!\n"); break;case 2: printf("Academic Building Center \n"); break;case 3: printf("UNION \n"); break;case 4: printf("Go ");case 5: printf("Kean! \n");default: printf("Have a great semester! \n"); break;}for(a=5; a<v1; a++) {printf("Kean");}printf("\n");if (v2 == 6) {s = "Go";}else {s = "Hello";}if(v3 != v4) {printf("%s Kean!\n",s);} else {printf("%s Computer Science!\n",s);}return 0;} Output: Exercise 1:====================Go Kean! Have a great semester! Go Kean! Please only modify the initial value of v0, v1, v2, v3 and v4 to get the following output. Youneed to show your program output (in the screenshot) and submit the code that youmodified.Exercise 1:====================Hello OctoberKeanHello Computer Science!arrow_forward
- (OnlineGDB) 1. Please read and run the following code and answer the questions.#include <stdio.h>int main(void) {int a;char *s;int v0 = 4, v1 = 5, v2 = 6, v3 = 1, v4 = 2;printf("Exercise 1:\n====================\n");switch(v0) {case 0: printf("Hello October\n"); break;case 1: printf("Go Kean!\n"); break;case 2: printf("Academic Building Center \n"); break;case 3: printf("UNION \n"); break;case 4: printf("Go ");case 5: printf("Kean! \n");default: printf("Have a great semester! \n"); break;}for(a=5; a<v1; a++) {printf("Kean");}printf("\n");if (v2 == 6) {s = "Go";}else {s = "Hello";}if(v3 != v4) {printf("%s Kean!\n",s);} else {printf("%s Computer Science!\n",s);}return 0;} What is the output of the program? Please explain why.arrow_forward1.[30 pts] Answer the following questions: a. [10 pts] Write a Boolean equation in sum-of-products canonical form for the truth table shown below: A B C Y 0 0 0 1 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 1 1 0 1 0 1 1 0 1 1 1 1 0 a. [10 pts] Minimize the Boolean equation you obtained in (a). b. [10 pts] Implement, using Logisim, the simplified logic circuit. Include an image of the circuitarrow_forwardIn the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using Javascript The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher keyarrow_forward
- List reasons why teachers should and shouldn’t be replaced by computers? State your response in a descriptive context. Provide five references from the with internet with your answers.arrow_forwardThe attached picture shows the RTCAPI memory mapped register which has the address 0x180. 1) Program the MCU's registers so that a) SIRC is the clock source b) the clock is divided by 16K c) the clock is enabled d) load is enabledarrow_forwardWhat is the ALU result if the 4-bit ALU Control signal is 0100? What happens if the ALU Control signal is 0101?arrow_forward
- In the past, encryption and decryption were mostly done by substitution and permutation of letters in a text message. study those classic cryptographic schemes Then, develop an automatic cipher using a programming language of your choice. The cipher should be able to perform the following tasks: generate keys encrypt a given plaintext message with a key selected from the list of keys generated decrypt a given ciphertext message with a known cipher keyarrow_forwardCase Study Instructions: Offshore Wind Energy in the North Sea For this case study, students will analyze the institutional challenges and social rules surrounding offshore wind energy development in the Dutch North Sea, as explored in the case study from the textbook (pages 44-46). Additional resources in this week’s learning module will provide further perspectives on the impact of wind energy on different stakeholders. Students should refer to the syllabus for specific guidelines regarding length, format, and content requirements. Reflection Questions to Consider: What are the key institutional challenges in implementing offshore wind energy in the North Sea? How do formal and informal social rules shape the use of this shared space? What conflicts arise between different stakeholders (e.g., fishermen, naval transport, military, and wind energy developers)? How can policymakers balance economic, environmental, and social considerations when allocating space for wind energy?…arrow_forwardAlphabetic Telephone Number TranslatorMany companies use telephone numbers like 555-GET-FOOD so the number is easier for their customers to remember. On a standard telephone, the alphabetic letters are mapped to numbers in the following fashion: A, B, and C = 2 D, E, and F = 3 G, H, and I = 4 J, K, and L = 5 M, N, and O = 6 P, Q, R, and S = 7 T, U, and V = 8 W, X, Y, and Z = 9 Write a program that asks the user to enter a 10-character telephone number in the format XXX-XXX-XXXX. The application should display the telephone number with any alphabetic characters that appeared in the original translated to their numeric equivalent. For example, if the user enters 555-GET-FOOD, the application should display 555-438-3663.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:Cengage

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage