Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Algorithms, Flowcharts, Documentation, and Errors in Programming, Study Guides, Projects, Research of Programming Languages

An overview of algorithms and flowcharts, their relationship, and the importance of documentation and different types of errors in programming. It also touches upon the concepts of SDLC and its phases, the importance of documentation in programming, and encryption and decryption.

Typology: Study Guides, Projects, Research

2018/2019

Uploaded on 04/21/2022

ana-lamborgini
ana-lamborgini 🇳🇵

5 documents

1 / 44

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Algorithms, Flowcharts, Documentation, and Errors in Programming and more Study Guides, Projects, Research Programming Languages in PDF only on Docsity! RESEARCH-BASED QUESTIONS: 1. What is the algorithm and flowchart? 2. What is advantage and disadvantage of algorithm? 3. What is advantage and disadvantage of flowchart? 4. What are the phases of sdlc? 5. What is documentation in programming, why is it importance? 6. What are different types of error in programming. 7. What is debugging? 8. What is incryption and decryption,why it is important? 1. RESEARCHED BASED ALGORITHM AND FLOWCHART DEFINITION OF FLOWCHART • A flowchart is the graphical or pictorial representation of an algorithm with the help of different symbols, shapes, and arrows to demonstrate a process or a program. With algorithms, we can easily understand a program. The main purpose of using a flowchart is to analyze different methods. Several standard symbols are applied in a flowchart:   Terminal Box- Start/ End   Input/ Output   Process/ Instruction   Decision   Connector/ Arrow —4 2. ADVANTAGES AND DISADVANTAGES OF ALGORITHM ADVANTAGE OF THE ALGORITHM •  Step-wise representation of a solution to a given problem, which makes it easy to understand. • An algorithm uses a definite procedure. • It is not dependent on any programming language, so it is easy to understand for anyone even without programming knowledge. • Every step in an algorithm has its own logical sequence so it is easy to debug. • By using algorithm, the problem is broken down into smaller pieces or steps hence, it is easier for programmer to convert it into an actual program. FLOWCHART • A flowchart is a type of diagram that represents a workflow or process. A flowchart can also be defined as a diagrammatic representation of an algorithm, a step- by-step approach to solving a task. ADVANTAGES •  Flowcharts are better way of communicating the logic of the system. • It is very easy to draw flowchart in any word processing software like MS word. • Using only very few symbol , complex problem can be represented in flowchart. • Flowchart is one of the good way of documenting programs. • It helps us in debugging process. DISADVANTAGES • Manual tracing is needed to check correctness of flowchart drawn on paper. • Simple modification in problem logic may leads to complete redraw of flowchart. • Showing many branches and looping in flowchart is difficult. • flowchart becames very complex and clumsy • Modification of flowchart is sometimes consuming. SDLC • Sdlc stands for software development life cycle. • It is the process used in software industry to design and develop a new software. • It is a methodology that define process which are followed to develop developing a high quality software. • Its aim is to define all the task reguired for developing and maintaining software. • It is also called as software development process. THE PHASES OF SDLC ARE FOLLOWING; 1. Requirement analysis 2. Defining 3. Designing 4. Coding 5. Testing 6. Deployment 7. Maintenance. 1. Requiremen t analysis • It is the most important and necessary stage in SDLC. • It collects necessary information from the customer to devlop a software as per the expectations. • In this method, the requirement has to be precise like what kind of operations will be done, how it will be done, what is the need of software , etc. • It helps to collect details of each requirement of customer so that developers will understand how to fill their requirements 4. Coding • In his phase of SDLC, the actual development begins, devlopers start coding of the design using programming language. • Programming tools like compilers, interpreters, debuggers, etc. Are used to develop and implement the code. • A number of devlopers code the modules and all the modules are arranged together to work efficiently. • It is the longest phase of sdlc. 5. Testing After the code is developed it is tested against the requirements to make sure that the products are solving the needs addressed and gathered during the requirements stage. • During this stage, unit testing, integration testing, system testing, acceptance testing are done. • Here, software is checked for bugs and errors. 6. Deployment Once the software is certified, and no bugs or errors are stated, then it is available for users to use it. • Even after development of software, if any bugs or error is still found then the software is re-evaluated by maintenance team and then re-deployed by a new version. • After the software is deployed, then its maintenance begins. WHAT IS DOCUMENTATION? Documentation is any communicable material that is used to describe, explain or instruct regarding some attributes of an object, system or procedure, such as its parts, assembly, installation, maintenance and use. Documentation can be provided on paper, online, or on digital or analog media, such as audio tape or CDs. Documentation has a very important part in programming and software engineering. DOCUMENTATION IN PROGRAMMING Documentation is written text or illustration that accompanies computer software or is embedded in the source code. The documentation either explains how the software operates or how to use it, and may mean different things to people in different roles. The term is derived from the idea that engineers and programmers ‘document’ their products in formal writing. The presence of documentation helps keep track of all aspects of an application and it improves on the quality of a software product. Its main focuses are development, maintenance and knowledge transfer to other developers. This is mainly a written material, video, image instruction that comes with computer software. The software documentation helps in explaining how to use a service or a program. There is a mainly different type of software documentation such as: •Requirements documentation •Architecture documentation •Technical documentation •End-user documentation In some companies, there is some special team who take care of the technical writing such as a documentation team.  6. ERRORS AND ITS TYPES IN PROGRAMING f eee ~~ TYPES OF ERROR Run-time errors Logical errors Syntax errors Run-time errors are errors that occur during program execution (run-time) following successful compilation. Division by zero, commonly known as Division error, is one of the most prevalent run- time errors. These errors are difficult to locate since the compiler does not indicate the line where the error occurs. 1. Run-time Errors; 3. Syntax Error: The compiler will display syntax errors if the rules of the C programming language are not followed.  Linker Errors: These errors occur when we use the Ctrl+F9 key to link the various object files with the main object after compilation (RUN). These are errors that occur when the program's executable cannot be created. This could be due to improper header files or inappropriate function prototyping. Writing Main() instead of main is a typical prevalent linker errors (). 7. DEBUGGING  It is the process of locating and eliminating problems in computer hardware and software.. Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext. The formulas used to encode and decode messages are called encryption algorithms, or ciphers. To be effective, a cipher includes a variable as part of the algorithm. The variable, which is called a key, is what makes a cipher's output unique. When an encrypted message is intercepted by an unauthorized entity, the intruder has to guess which cipher the sender used to encrypt the message, as well as what keys were used as variables. The time and difficulty of guessing this information is what makes encryption such a valuable security tool. Encryption has been a longstanding way for sensitive information to be protected.  Historically, it was used by militaries and governments.  In modern times, encryption is used to protect data stored on computers and storage devices, as well as data in transit over networks.   Encryption: Importance of encryption: ->It’s the best way to protect all kinds of data that demand confidentiality. Examples include usernames and passwords. Not only that, but it can also make any type of private information (such as medical records, bank statements and social security details) safe on a computer. Even if the computer gets hacked, criminals won’t be able to decipher anything of importance. ->It acts as a seal of approval for the receiver of the message that the contents of the transferred file or any other document have been maintained and nothing has been altered by anyone. ->Without it, there would be no way for companies and governments to protect their research and put an end to problems such as plagiarism and intellectual property theft. ->It’s extremely helpful for people who want to communicate over a network like the internet. Recent years have seen hackers and government agencies becoming very skilled at breaking in and recording people’s conversations. These processes help prevent that from happening. ->It allows the owner of a file or data to deny or grant access to anyone they want and keep everyone else from accessing it. ee Decrypting 12.10
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved