a) Using the pseudocode declarations below, identify i) An enumerated data type ii) A composite data type
Question:
a) Using the pseudocode declarations below, identify
i) An enumerated data type
ii) A composite data type
iii) A non-composite data type
iv) A user-defined data type.
Write pseudocode to declare a variable Journal of type TJournal Record and assign the following values to the variable.
Title – Spring Flowers
Author – H Williams
Publisher – XYZ Press
Number of pages – 40
Season – Spring
Transcribed Image Text:
TYPE Tseason = (Spring, Summer, Autumn, Winter) TYPE TJournalRecord DECLARE title : STRING DECLARE author : STRING DECLARE publisher : STRING DECLARE noPages : INTEGER DECLARE season : Tseason ENDTYPE Acti
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 72% (11 reviews)
ANSWER DECLARE Journal TJournalRecord Journaltitle Spring Flowers ...View the full answer
Answered By
Churchil Mino
I have been a tutor for 2 years and have experience working with students of all ages and abilities. I am comfortable working with students one-on-one or in small groups, and am able to adapt my teaching style to meet the needs of each individual. I am patient and supportive, and my goal is to help my students succeed.
I have a strong background in math and science, and have tutored students in these subjects at all levels, from elementary school to college. I have also helped students prepare for standardized tests such as the SAT and ACT. In addition to academic tutoring, I have also worked as a swim coach and a camp counselor, and have experience working with children with special needs.
0.00
0 Reviews
10+ Question Solved
Related Book For
Cambridge International AS & A Level Computer Science
ISBN: 9781510457591
1st Edition
Authors: David Watson, Helen Williams
Question Posted:
Students also viewed these Computer science questions
-
A hybrid composite is defined as a composite material containing two or more different types of reinforcing fibers. What advantages would such a composite have over other composites?
-
Write out in pseudocode an algorithm for solving a simultaneous system of linear congruences based on the construction in the proof of the Chinese remainder theorem.
-
Write an essay that states an original thesis statement on what impacts/influences student learning. Demonstrate the ability to write clearly and cohesively when expressing ones ideas and or intended...
-
Simplify the following expressions according to the commutative law: a. b. A B + A C + B A c. (L M N)(A B)(C D E)(M N L) d. F (K + R) + S V + W + V S + W + (R + K) F A.B + B.A + C.D.E + C.DE + E.T.D
-
Overproduction of uric acid in the body can be an indication of cell breakdown. This may be an advance indication of illness such as gout, leukemia, or lymphoma. Over a period of months, an adult...
-
1. What are the top three key decisions faced by Joe? 2. What are the key deliverables that an outside researcher should produce to help Joe with the key decisions? 3. How relevant are the coffee...
-
8. Assume that an enterprise has 10 operating segments. Of these, five segments qualify as reportable segments by passing one of the 10 percent tests. However, their combined revenues from sales to...
-
You are chairperson of the investment fund for the Continental Soccer League. You are asked to set up a fund of semiannual payments to be compounded semiannually to accumulate a sum of $250,000 after...
-
Ayayal, AG had net sales in 2022 of 1428.800, At December 31, 2022, before adjusting entries, the balances in selected accounts were Accounts Receivable 392.000 debit, and Allowance for Doubtful...
-
Sketch vo for each network of Fig. 2.177 for the input shown. Would it be a good approximation to consider the diode to be ideal for both configurations? Why? 120 V Si Si E - 20V
-
In a particular computer system, real numbers are stored using floating-point representation with: 8 Bits for the mantissa 8 Bits for the exponent Twos complement form for both mantissa and...
-
a) Three file organisation methods and two file access methods are shown below. Copy the diagram below and connect each file organisation method to its appropriate file access method(s). b) An energy...
-
Should a job seeker pursue a nonsequential or a sequential search strategy? Derive a job seekers asking wage. Discuss why the asking wage makes a worker indifferent between searching and not...
-
Small paragraphs address these sub questions, 1. What is governance? 2. What drives the strategy orientation of the leadership ? 3. How do strategies trickle down to management and translate to...
-
Accommodating guests with disabilities must be a priority for venue and event managers. With a growing population of persons with disabilities, it's important to identify current trends on how venues...
-
a. (6) The Fibonacci sequence is defined by Fo= 0, F = 1, and, for all n > 2, Fn = Fn-1+ Fn-2- Prove that Fn O(2"), without using part (b). b. (6) Let An C {0, 1}" be the set of binary strings of...
-
Customer purchase history matrix. A store keeps track of its sales of products from K different product categories to N customers over some time period, like one month. (While it doesn't matter for...
-
2. A Beautiful Circuit Answer the following questions about the 4-resistor circuit shown below. A. Calculate the equivalent resistance of this circuit. B. Calculate the power delivered to the circuit...
-
Home Stop sells two product categories, furniture and accessories. Information pertaining to its 2021 year-end inventory is as follows: Required: 1. Determine the carrying value of inventory at...
-
Describe the Operations (+,,*,/) that can cause negligible addition (NA), error magnification (EM), or subtractive cancellation (SC) in calculating ?((x^2)+1) - x . Give the range of where they might...
-
Consider the following code fragment, taken from some package:
-
Consider the inheritance of classes from Exercise R-2.12, and let d be an object variable of type Horse. If d refers to an actual object of type Equestrian, can it be cast to the class Racer? Why or...
-
Give an example of a Java code fragment that performs an array reference that is possibly out of bounds, and if it is out of bounds, the program catches that exception and prints the following error...
-
QUESTION 3 A business owns seven flats rented out to staff at R500 per month. All flats were tenanted Ist january 21 months rent was in arrears and as at 31st December 14 months' rent wa Identify the...
-
1. 2. 3. Select the Tables sheet, select cells A6:B10, and create range names using the Create from Selection button [Formulas tab, Defined Names group]. Select cells B1:F2 and click the Name box....
-
Tropical Rainwear issues 3,000 shares of its $18 par value preferred stock for cash at $20 per share. Record the issuance of the preferred shares. (If no entry is required for a particular...
Study smarter with the SolutionInn App