SlideShare a Scribd company logo
1 of 18
Introduction to Computers Module 1. ECE –B
Contents Definition of data. Information and Processing. Basic Computer Operations. Applications of information systems. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 2
Definition of Data Usually the term 'data' suggests something raw and unrefined. Its the most fundamental form of information. Information in raw or unorganized form (such as alphabets, numbers, or symbols) that refer to, or represent, conditions, ideas, or objects.  Data is limitless and present everywhere in the universe. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 3
Information Data that   has been verified to be accurate and timely,   is specific and organized for a purpose,    is presented within a context that gives it meaning and relevance, and    that can lead to an increase in understanding and decrease in uncertainty. 	The value of information lies solely in its ability to affect a behavior, decision, or outcome. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 4
Processing Process or processing typically describes the action of taking something through an established and usually routine set of procedures  It can be the steps to convert the action from one form to another, such as processing paperwork to grant a mortgage loan, processing milk into cheese, or converting computer data from one form to another.  A process involves steps and decisions in the way work is accomplished 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 5
Processing in technically refers to any process that a computer program does to enter data and summarise, analyse or otherwise convert data into usable information.  The process may be automated and run on a computer. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 6
Applications of Information systems Information Systems  is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study.  Some of its applications include: Geographic information system Hospital information system Airline information system Hotel information system 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 7
Introduction to structured programming Flow Chart Pseudo code 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 8
What is a Flow Chart? A flow chart is a graphical or symbolic representation of a process.  Each step in the process is represented by a different symbol and contains a short description of the process step.  The flow chart symbols are linked together with arrows showing the process flow direction.  01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 9
A really simplistic flow chart showing the flow chart symbols described above can be seen above. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 10
A Note on Flowchart Symbols Different flow chart symbols have different meanings. The most common flow chart symbols are: Terminator: An oval flow chart shape indicating the start or end of the process. Process: A rectangular flow chart shape indicating a normal process flow step. Decision: A diamond flow chart shape indication a branch in the process flow. Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow. Data: A parallelogram that indicates data input or output (I/O) for a process. Document: used to indicate a document or report. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 11
01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 12
Pseudocode An outline of a program, written in a form that can easily be converted into real programming statements. Pseudocode cannot be compiled nor executed, and there are no real formatting or syntax rules 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 13
Why use pseudocode? Once pseudocode is created, it is simple to translate it into real programming code. Opportunity to detect any logic error prior to actual coding, which is a lot more expensive and time consuming. Used for planning the programming.  01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 14
Example Read student name. Get system date . Read student ID number. Get order for the books. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 15
Mathematical symbols in Pseudocode: 	The following symbols can be used in pseudocode:  + for Add,  - for Subtract,  * for Multiply,  / for Divide,  ( ) for Parentheses  Compute C = (F - 32) * 5 / 9  01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 16
Common Action Keywords 	Several keywords are often used to indicate common input, output, and processing operations. 	Input: READ, OBTAIN, GET Output: PRINT, DISPLAY, SHOW Compute: COMPUTE, CALCULATE, DETERMINE Initialize: SET, INIT Add one: INCREMENT, BUMP 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 17
Revision

More Related Content

Similar to Data, Information System, Processing

Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computersnirupam16
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifahalish sha
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business IntelligenceSukirti Garg
 
Module 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docxModule 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docxraju957290
 
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...Bryan Guibijar
 
Accountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docxAccountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docxrenatas0nie
 
Data information and information system
Data information and information systemData information and information system
Data information and information systemnripeshkumarnrip
 
System analysis ITM3.pptx
System analysis ITM3.pptx System analysis ITM3.pptx
System analysis ITM3.pptx Aram Mohammed
 
Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek outiaemedu
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle shefali mishra
 
Sap Interview Questions - Part 1
Sap Interview Questions - Part 1Sap Interview Questions - Part 1
Sap Interview Questions - Part 1ReKruiTIn.com
 
An overview of popular analytics toolkits
An overview of popular analytics toolkitsAn overview of popular analytics toolkits
An overview of popular analytics toolkitsRamkumar Ravichandran
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptxamitparashar42
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptxamitparashar42
 

Similar to Data, Information System, Processing (20)

Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
It 302 computerized accounting (week 2) - sharifah
It 302   computerized accounting (week 2) - sharifahIt 302   computerized accounting (week 2) - sharifah
It 302 computerized accounting (week 2) - sharifah
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Module 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docxModule 3 SLP will introduce the basic concepts of computer network.docx
Module 3 SLP will introduce the basic concepts of computer network.docx
 
Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)Lecture1-IS322(Data&InfoMang-introduction)
Lecture1-IS322(Data&InfoMang-introduction)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
Data Flow Diagram (DFD) in Developing Online Product Monitoring System (OPMS)...
 
Accountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docxAccountants can use data flow diagrams (DFDs) to depict the physical.docx
Accountants can use data flow diagrams (DFDs) to depict the physical.docx
 
Data information and information system
Data information and information systemData information and information system
Data information and information system
 
MIS.ppt
MIS.pptMIS.ppt
MIS.ppt
 
System analysis ITM3.pptx
System analysis ITM3.pptx System analysis ITM3.pptx
System analysis ITM3.pptx
 
Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek out
 
Notacd11
Notacd11Notacd11
Notacd11
 
Software development life cycle
Software development life cycle Software development life cycle
Software development life cycle
 
Sap Interview Questions - Part 1
Sap Interview Questions - Part 1Sap Interview Questions - Part 1
Sap Interview Questions - Part 1
 
Dbms_class _14
Dbms_class _14Dbms_class _14
Dbms_class _14
 
An overview of popular analytics toolkits
An overview of popular analytics toolkitsAn overview of popular analytics toolkits
An overview of popular analytics toolkits
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptx
 
Data Analytics Introduction.pptx
Data Analytics Introduction.pptxData Analytics Introduction.pptx
Data Analytics Introduction.pptx
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Data, Information System, Processing

  • 1. Introduction to Computers Module 1. ECE –B
  • 2. Contents Definition of data. Information and Processing. Basic Computer Operations. Applications of information systems. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 2
  • 3. Definition of Data Usually the term 'data' suggests something raw and unrefined. Its the most fundamental form of information. Information in raw or unorganized form (such as alphabets, numbers, or symbols) that refer to, or represent, conditions, ideas, or objects. Data is limitless and present everywhere in the universe. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 3
  • 4. Information Data that has been verified to be accurate and timely, is specific and organized for a purpose, is presented within a context that gives it meaning and relevance, and that can lead to an increase in understanding and decrease in uncertainty. The value of information lies solely in its ability to affect a behavior, decision, or outcome. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 4
  • 5. Processing Process or processing typically describes the action of taking something through an established and usually routine set of procedures It can be the steps to convert the action from one form to another, such as processing paperwork to grant a mortgage loan, processing milk into cheese, or converting computer data from one form to another. A process involves steps and decisions in the way work is accomplished 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 5
  • 6. Processing in technically refers to any process that a computer program does to enter data and summarise, analyse or otherwise convert data into usable information. The process may be automated and run on a computer. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 6
  • 7. Applications of Information systems Information Systems is an academic/professional discipline bridging the business field and the well-defined computer science field that is evolving toward a new scientific area of study. Some of its applications include: Geographic information system Hospital information system Airline information system Hotel information system 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 7
  • 8. Introduction to structured programming Flow Chart Pseudo code 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 8
  • 9. What is a Flow Chart? A flow chart is a graphical or symbolic representation of a process. Each step in the process is represented by a different symbol and contains a short description of the process step. The flow chart symbols are linked together with arrows showing the process flow direction. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 9
  • 10. A really simplistic flow chart showing the flow chart symbols described above can be seen above. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 10
  • 11. A Note on Flowchart Symbols Different flow chart symbols have different meanings. The most common flow chart symbols are: Terminator: An oval flow chart shape indicating the start or end of the process. Process: A rectangular flow chart shape indicating a normal process flow step. Decision: A diamond flow chart shape indication a branch in the process flow. Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow. Data: A parallelogram that indicates data input or output (I/O) for a process. Document: used to indicate a document or report. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 11
  • 12. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 12
  • 13. Pseudocode An outline of a program, written in a form that can easily be converted into real programming statements. Pseudocode cannot be compiled nor executed, and there are no real formatting or syntax rules 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 13
  • 14. Why use pseudocode? Once pseudocode is created, it is simple to translate it into real programming code. Opportunity to detect any logic error prior to actual coding, which is a lot more expensive and time consuming. Used for planning the programming. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 14
  • 15. Example Read student name. Get system date . Read student ID number. Get order for the books. 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 15
  • 16. Mathematical symbols in Pseudocode: The following symbols can be used in pseudocode: + for Add, - for Subtract, * for Multiply, / for Divide, ( ) for Parentheses Compute C = (F - 32) * 5 / 9 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 16
  • 17. Common Action Keywords Several keywords are often used to indicate common input, output, and processing operations. Input: READ, OBTAIN, GET Output: PRINT, DISPLAY, SHOW Compute: COMPUTE, CALCULATE, DETERMINE Initialize: SET, INIT Add one: INCREMENT, BUMP 01-Aug-11 Usha Mary Sharma, DBCET. Dept of CS & IT 17