Title | Activity 4 |
---|---|
Course | Cybersecurity and Ethical Hacking |
Institution | Grand Canyon University |
Pages | 5 |
File Size | 204.9 KB |
File Type | |
Total Downloads | 90 |
Total Views | 169 |
Activity four project details and help...
1
Activity 3
Ty Donaldson CSET, Grand Canyon University ITT-310, Programming for Security Professionals Professor Jackson 7 February 2021
2 Activity 3 Part 1: C has become very interesting as it goes on. I thought it was very interesting how many data types there are. While learning about topic 3, I did not understand how many integers types there were. It was great learning about how each integer type had a storage size and a value range. I believe when coding it will be important to use certain types of int due to planning for storage sizes. I would not want to use an unassigned char for a phone number, I would want to at least use a int. While studying operators, it was interesting using operators to debug the program. Part 2: Flow chat for Figure 1:
Pseudo code for Figure 1: Start Print: Char_Bit Char_Max Char_Min Int_Max
3 Int_Min Long_Max Long_Min Schar_Max Schar_Min Shrt_Max Shrt_Min Uchar_Max Uint_Max Ulong_Max UShirt_Max Get int A Get int B Get int C Get float F Print value of C Print value of F
4 SCREENSHOT 1
Part 3: 5 bugs in figure 1: 1. Change the int main(int argc, char** argv) 2. Remove int = a
5 3. Remove int = c 4. Set const int c = 100; 5. Add end } Part 4: Screenshot 2
Screenshot 3...