Activity 4 PDF

Title Activity 4
Course Cybersecurity and Ethical Hacking
Institution Grand Canyon University
Pages 5
File Size 204.9 KB
File Type PDF
Total Downloads 90
Total Views 169

Summary

Activity four project details and help...


Description

1

Activity 3

Ty Donaldson CSET, Grand Canyon University ITT-310, Programming for Security Professionals Professor Jackson 7 February 2021

2 Activity 3 Part 1: C has become very interesting as it goes on. I thought it was very interesting how many data types there are. While learning about topic 3, I did not understand how many integers types there were. It was great learning about how each integer type had a storage size and a value range. I believe when coding it will be important to use certain types of int due to planning for storage sizes. I would not want to use an unassigned char for a phone number, I would want to at least use a int. While studying operators, it was interesting using operators to debug the program. Part 2: Flow chat for Figure 1:

Pseudo code for Figure 1: Start Print: Char_Bit Char_Max Char_Min Int_Max

3 Int_Min Long_Max Long_Min Schar_Max Schar_Min Shrt_Max Shrt_Min Uchar_Max Uint_Max Ulong_Max UShirt_Max Get int A Get int B Get int C Get float F Print value of C Print value of F

4 SCREENSHOT 1

Part 3: 5 bugs in figure 1: 1. Change the int main(int argc, char** argv) 2. Remove int = a

5 3. Remove int = c 4. Set const int c = 100; 5. Add end } Part 4: Screenshot 2

Screenshot 3...


Similar Free PDFs