Nt1310 Unit 3 Data Analysis

Improved Essays
Part 1
Different data types and their uses
- The different data types that is available for creating or developing a program on software. An example of programming software would be Microsoft Visual Studio. With this software, many data types are used which can drive an event.

- The different data types available for programming are String, Integer, Single, Double, Boolean and Date.

- Data Type: String
 Use of String: A String can be used as a form of a character e.g. “a” or a string of characters e.g. “abcdefg”. It can be any type of text e.g. “Hello World!”.
• Alphabetic – A to Z, a to z, space
• Special characters - £$%&
• Numbers that are not used for calculations.

- Data Type: Integer
 Use of Integer: An Integer can be used as a whole number e.g. a number between 0 and 10. If I had a variable name called First Number as an integer, the code would look like Dim FirstNumber as Integer.

-
…show more content…
12345.67

- Data Type: Double
 Use of Double: A Double can be used as decimal numbers with less than 14 significant digits e.g. 12345678.78

- Data Type: Boolean
 Use of Boolean: A Boolean can be used for a question with two possible answers that a value to a question e.g. is the car yellow? Yes or No. Other range of value can be true or false. As a code, a Boolean would look like Dim answer as Boolean.

Importance of data

Related Documents

  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    We want the neural network to predict the stock price at a future date using stock price, EMA, RSI and MACD data of today and the last few days. The neural network can be configured to have a specified number of hidden layers. In addition to hidden layers the neural network has an input layer and an output layer. In the input layer we give the input that is stock price, EMA, RSI and MACD data of today and the last few days. The hidden layer comes between the input layer and the output layer.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Paper

    • 617 Words
    • 3 Pages

    Project One 8) The variables that were given to me include specific foundation brands (Maybelline, Covergirl, Bare Minerals, etc.,) and the cost of each individual foundation. The qualitative variable in this set was the foundation brand, since they are an attribute rather than a number. The quantitative variable was the cost of each individual foundation, since that variable is a number doing a number's job. 9)…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    The negative number will not be considered as a part of the symbol map. error in (no error) can accept error information wired from previously called VIs. Use this information to decide if any functionality should be bypassed in the event of errors from other VIs. code identifies the error or warning code. source describes the origin of the error or warning.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The third application software is mapping. Mapping application, are those that display street maps or satellite, and are usually used to locate places and directions. The most extensive mapping application is Google maps. When it comes to the location based software it uses your current location, and shows you the closest restaurants, shops, banks, etc. these software's are available for desktops, laptops, and handheld computers.…

    • 223 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Case Study

    • 405 Words
    • 2 Pages

    Each totaltraffic graph in the method section shows the server or the client with the above RTT and Window Size as incoming and outgoing traffic. The horizontal axis represents the time in seconds and the vertical axis represents the measured traffic in bytes. The graphs presents the increase of traffic once the experiments starts and ends. Case 3. In comparing the window size and RTT staying the same, the traffic decrease once the window size increase.…

    • 405 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Xacc/280 Week 6 Checkpoint

    • 1119 Words
    • 5 Pages

    In this course we will consider significant figures to be: 1) any non-zero digit, 2) zeros within a number…

    • 1119 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Let’s say that we have calculated effectiveness (assuming PD=0,8; PA=0,9; PI=0,6; PN=0,4) and it equals to 0,8 x 0,9 x 0,6 x 0,4 =0,1728. Remember, the conditional risk formula? Assuming again, that probability of attack and relative consequences both equal 1,0, conditional risk R= 1,0 x (1 – 0,1728) x 1,0 =…

    • 498 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This.x is the dot notation of the variable x. /* 5 */ - This.y equals to the y that is being used in a specific instance of the object, in this case, y. This.y is the dot notatiion of the variable y. This object is created using dot notation so that object can be stored in a singular function. /* 6 */ - This ends the Winston function. /* 7 */ - Then, the variable winstonTeen is set to equal a new Winston that has the parameters: nickname: “Winsteen”, age: 15, x: 20, y: 50. /* 8 */ - The variable winstonAdult is set to equal a new Winston that has the parameters: nickname: “Mr. Winst-a-lot”, age: 30, x: 229, y: 50.…

    • 651 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Following our in-depth study into writing systems in our First Year Seminar class as well as the ways in which writing systems have served their time period, our group collectively created a writing system named Gibba Jabber. Our writing system intends to serve the modern-day society, the 21st century. The 21st century is a century where written communication takes precedent over verbal communication. In other words, texting has replaced the need of phone calls due to the advancement of texting, which has allowed emotions, ideologies and sentences to be conveyed in such fewer words with the help of emoticons. After analyzing modern-day society and its dependence on social media mediums such as twitter and instagram, we came to the understanding…

    • 1327 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Numerical data are values that can be measures. By taking two numerical variables together, it can reveal possible relationships between each other. For example, two numerical variables in this data are age and the usage of product TM195. Now, to help you visualize the comparison, histograms are a great way to explain the difference. Histograms visualize data with vertical bar charts where each bar represents a class interval.…

    • 762 Words
    • 4 Pages
    Improved Essays