Nt1310 Unit 3 Data Analysis

Improved Essays
Part 1
Different data types and their uses
- The different data types that is available for creating or developing a program on software. An example of programming software would be Microsoft Visual Studio. With this software, many data types are used which can drive an event.

- The different data types available for programming are String, Integer, Single, Double, Boolean and Date.

- Data Type: String
 Use of String: A String can be used as a form of a character e.g. “a” or a string of characters e.g. “abcdefg”. It can be any type of text e.g. “Hello World!”.
• Alphabetic – A to Z, a to z, space
• Special characters - £$%&
• Numbers that are not used for calculations.

- Data Type: Integer
 Use of Integer: An Integer can be used as a whole number e.g. a number between 0 and 10. If I had a variable name called First Number as an integer, the code would look like Dim FirstNumber as Integer.

- Data Type: Single  Use of Single: A Singlecan be used as decimal numbers with less than 7 significant digits e.g.
…show more content…
12345.67

- Data Type: Double
 Use of Double: A Double can be used as decimal numbers with less than 14 significant digits e.g. 12345678.78

- Data Type: Boolean
 Use of Boolean: A Boolean can be used for a question with two possible answers that a value to a question e.g. is the car yellow? Yes or No. Other range of value can be true or false. As a code, a Boolean would look like Dim answer as Boolean.

Importance of data types - Having data types are important because they each have their own benefits. Benefits of having any sort of data type are its ability to reflect on the type of data being held. E.g. it won’t be suitable if you were to have someone’s date of birth as an integer; it would be suitable if it was as date. - In addition to this, having various of data types is a good thing for a programmer as it can save up on memory as various of data types will have memory bigger than the other e.g. Date having 8 bytes and Integer having 2 bytes. It also saves usages of the CPU of using a variety of data types of where it’s needed. Data types show that valuable storage and faster processing is beneficial towards a programmer. - Data Type: Boolean.  A benefit for Boolean is that it can be used for creating both true and false statements. Also, it can be written in both algorithm and coding. - Data Type: String.  A benefit for the string data type can hold a number characters or a word like “Morning”. Quotations are needed for the word so that the program knows what word needs to be used. - Data Type: Integer.  A benefit for integer is that it allows the programmer to whole number in a code. - Data Type: Double.  A benefit for Double is that it can contain more than one digit than a single data type. Also, a Double data type can store twice as much as a Single hence Double having a memory of 8 bytes to 14 bytes and Single having 4 bytes up to 7 bytes. What issues can arise if unsuitable data types are used? - Choosing the correct data types for a variable

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    We want the neural network to predict the stock price at a future date using stock price, EMA, RSI and MACD data of today and the last few days. The neural network can be configured to have a specified number of hidden layers. In addition to hidden layers the neural network has an input layer and an output layer. In the input layer we give the input that is stock price, EMA, RSI and MACD data of today and the last few days. The hidden layer comes between the input layer and the output layer.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Paper

    • 617 Words
    • 3 Pages

    Project One 8) The variables that were given to me include specific foundation brands (Maybelline, Covergirl, Bare Minerals, etc.,) and the cost of each individual foundation. The qualitative variable in this set was the foundation brand, since they are an attribute rather than a number. The quantitative variable was the cost of each individual foundation, since that variable is a number doing a number's job. 9)…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In OSI stack, presentation layer converts data transferred by the application layer of the transport node. The functions of presentation layer are : 1. Data transcription 2. Data reconstruction 3.…

    • 139 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Pt1420 Unit 8

    • 925 Words
    • 4 Pages

    The integer variable provided in the second argument will be assigned the position of the opening parenthesis of the parentheses that is around the string returned by the function. The third argument is an integer and is assigned a vale to indicate the position of the closing…

    • 925 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Cybersecurity is vital to improving the security and reliability of the Western Interconnection power grid. As one of the most complex and critical infrastructures, the importance of prioritizing the continued security of the power grid should be at the top of the list. There are many different options that can improve security levels of both a physical and logical nature, such as disk drive encryption, digital certificates, Transport Layer Security (TLS), and Virtual Private Networks. Recommendation: Implement Full Disk Encryption Full disk encryption is the ability to convert data into unreadable code that can only be deciphered by authorized people. The encryption can include almost everything on the system such as temporary files and swap files.…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Let’s say that we have calculated effectiveness (assuming PD=0,8; PA=0,9; PI=0,6; PN=0,4) and it equals to 0,8 x 0,9 x 0,6 x 0,4 =0,1728. Remember, the conditional risk formula? Assuming again, that probability of attack and relative consequences both equal 1,0, conditional risk R= 1,0 x (1 – 0,1728) x 1,0 =…

    • 498 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This.x is the dot notation of the variable x. /* 5 */ - This.y equals to the y that is being used in a specific instance of the object, in this case, y. This.y is the dot notatiion of the variable y. This object is created using dot notation so that object can be stored in a singular function. /* 6 */ - This ends the Winston function. /* 7 */ - Then, the variable winstonTeen is set to equal a new Winston that has the parameters: nickname: “Winsteen”, age: 15, x: 20, y: 50. /* 8 */ - The variable winstonAdult is set to equal a new Winston that has the parameters: nickname: “Mr. Winst-a-lot”, age: 30, x: 229, y: 50.…

    • 651 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Numerical data are values that can be measures. By taking two numerical variables together, it can reveal possible relationships between each other. For example, two numerical variables in this data are age and the usage of product TM195. Now, to help you visualize the comparison, histograms are a great way to explain the difference. Histograms visualize data with vertical bar charts where each bar represents a class interval.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Following our in-depth study into writing systems in our First Year Seminar class as well as the ways in which writing systems have served their time period, our group collectively created a writing system named Gibba Jabber. Our writing system intends to serve the modern-day society, the 21st century. The 21st century is a century where written communication takes precedent over verbal communication. In other words, texting has replaced the need of phone calls due to the advancement of texting, which has allowed emotions, ideologies and sentences to be conveyed in such fewer words with the help of emoticons. After analyzing modern-day society and its dependence on social media mediums such as twitter and instagram, we came to the understanding…

    • 1327 Words
    • 6 Pages
    Superior Essays