OUTLINE ASM2 Programming 2022
OUTLINE ASM2 Programming 2022
INFORMATION TECHNOLOGY
ASSIGNMENT 2
UNIT: PROGRAMMING
STUDENT :
CLASS :
STUDENT ID :
SUPERVISOR : NGUYEN HOANG ANH VU
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand
the consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Student’s signature:
Quoc Viet
Grading grid:
P2 P3 P4 P5 M2 M3 M4 D2 D3
Perform by Quoc
ACKNOWLEDGMENTS
First of all, I would like to thank my mentor Nguyen Hoang Anh Vu for his constant
support in my studies and research, for his patience, motivation, enthusiasm and rich
knowledge. His guidance has helped me throughout the time of studying and writing this
thesis. Without your wonderful help, I would not have been able to achieve this.
Last but not least, I would like to thank my family, who gave birth to me from the
beginning and supported me spiritually. They are always behind to care and help me have
more motivation to complete the work well!
Perform by Quoc
ASSURANCE
I declare that this is my work, based on my research, and that I have recognized all
materials and sources utilized in its production, including books, papers, reports, lecture
notes, and any other type of document, electronic or personal communication.
I further declare that I have not previously submitted this assignment for assessment
in any other unit, except where explicit permission has been granted by all unit coordinators
involved, or at any other time in this unit, and that I have not duplicated or stolen ideas from
the work of others in any way.
I verify that the work I've submitted for this assignment is all my own, and that all
research sources have been properly credited.
Perform by Quoc
TABLE OF CONTENT
REVIEWERS ...................................................................................................................... ii
ACKNOWLEDGMENTS ..................................................................................................... iv
ASSURANCE ..................................................................................................................... v
INTRODUCTION ................................................................................................................ 1
2.3 Critically evaluate the source code of an application which implements the
programming paradigms, in terms of the code structure and characteristics. (D2) .............. 14
Perform by Quoc
3. Implement basic algorithms in code using an IDE (LO3) and determine the
debugging process and explain the importance of a coding standard (LO4)… ................. 27
3.1 Write a program that implements an algorithm using an IDE. (P3) ......... 27
3.2 Use the IDE to manage the development process of the program. (M3).37
3.3 Evaluate the use of an IDE for development of applications contrasted with
not using an IDE (D3) ....................................................................................................... 41
3.4 Explain the debugging process and explain the debugging facilities
available in the IDE (P4)……………………………………………………………………...….43
3.5 Evaluate how the debugging process can be used to help develop more
secure, robust applications. (M4) ....................................................................................... 50
3.6 Critically evaluate why a coding standard is necessary in a team as well as
for the individual. (D4) ........................................................................................................ 53
3.7 Outline the coding standard you have used in your code. (P5) …… ........ 53
3.8 Scenario…………………………………………..…………………………….55
3.9 Issues…………………….……………………………………………………..55
3.10 Idea…………………………………….…………………………………..….55
3.11 Describe the idea of the program algorithm….…………………..……….56
CRITICAL EVALUATION……………...………………………………………………………..70
CONCLUSION................................................................................................................... 71
REFERENCES ................................................................................................................. 72
Perform by Quoc
LIST OF TABLES AND FIGURES
Table 2-1: Compare of OOP and POP10.............................................................................. 2
Table 2-2: Compare value types………………………………………………………………...16
Table 4-1: Name objects .................................................................................................... 53
Perform by Quoc
Figure 3-2: Source code of Casio...................................................................................... 29
Figure 3-3: Source code of Casio...................................................................................... 30
Figure 3-4: Source code of Casio...................................................................................... 31
Figure 3-5: Source code of Casio...................................................................................... 32
Figure 3-6: Source code of Casio...................................................................................... 32
Figure 3-7: Testing ............................................................................................................ 33
Figure 3-8: Invalid Value.................................................................................................... 34
Figure 3-9: Testing ............................................................................................................ 35
Figure 3-10: Enter Value ................................................................................................... 36
Figure 3-11: Open Project.................................................................................................. 37
Figure 3-12: Select Options............................................................................................... 38
Figure 3-13: Create a new project ..................................................................................... 39
Figure 3-14: A new project................................................................................................. 39
Figure 3-15: Create a new form......................................................................................... 40
Figure 3-16: Form Login ................................................................................................... 40
Figure 3-17: Add new item ................................................................................................ 41
Figure 3-18: IDEs .............................................................................................................. 42
Figure 3-19: Bugs ............................................................................................................. 43
Figure 3-20: Bug CS0103 ................................................................................................. 44
Figure 3-21: Bug CS0117 ................................................................................................. 45
Figure 3-22: Debug ........................................................................................................... 45
Figure 3-23: Bug CS0117 ................................................................................................. 45
Figure 3-24: Debug ........................................................................................................... 46
Figure 3-25: Bug CS0103 ................................................................................................. 46
Figure 3-26: Testing .......................................................................................................... 47
Figure 3-27: Result ........................................................................................................... 47
Figure 28: Form Login ....................................................................................................... 47
Figure 3-29: Bug ............................................................................................................... 48
Figure 3-30: Bug ............................................................................................................... 48
Figure 3-31: Fix bug .......................................................................................................... 49
Figure 3-32: Testing .......................................................................................................... 49
Figure 3-33: Effects of the debugger ................................................................................. 50
Figure 3-34: Look in the error list table for a syntax error .................................................. 51
Figure 3-35: Look over the alert for any problems ............................................................. 51
Figure 3-36: Effects of the debugger ................................................................................. 51
Figure 3-37: Command or suspect breakpoint ................................................................... 52
Figure 3-34: Coding standard............................................................................................ 51
Figure 3-35: Standards ..................................................................................................... 51
Figure 3-36: Indent ............................................................................................................ 52
Figure 4-1: Form Login ..................................................................................................... 57
Figure 4-2: Source code of form login ............................................................................... 57
Figure 4-3: Form student management system ................................................................. 58
Perform by Quoc
Figure 4-4: Form Personal Information .............................................................................. 58
Figure 4-5: Source code of student management system… .............................................. 59
Figure 4-6: Source code of personal information ............................................................... 60
Figure 4-7: Form admin .................................................................................................... 61
Figure 4-8: Enter information............................................................................................. 61
Figure 4-8: Buttons ........................................................................................................... 61
Figure 4-9: Student information......................................................................................... 61
Figure 4-10: Enter information........................................................................................... 62
Figure 4-11: Notification .................................................................................................... 62
Figure 4-12: Update information ........................................................................................ 63
Figure 4-13: Delete information......................................................................................... 63
Figure 4-14: Result ........................................................................................................... 64
Figure 4-15: Sort information............................................................................................. 66
Figure 4-16: Search information........................................................................................ 67
Figure 4-17: Search information........................................................................................ 67
Figure 4-18: Source code of Admin form ........................................................................... 67
Figure 4-19: Source code of Admin form ........................................................................... 68
Figure 4-20: Source code of Admin form ........................................................................... 69
Perform by Quoc
LIST OF THE ACRONYM
Perform by Quoc
INTRODUCTION
Programming plays an extremely important role in life. Coming to this report, we will
learn about understanding programming models such as procedural programming, object-
oriented programming, and event-oriented programming.
As well as the structure of a program, data, and basic data, while also introducing
students to the use of an integrated development environment (IDE), its functions, and some
standard rules, such as naming in code. At the same time, it assists students in learning
how to create simple apps. Let's find out in this assignment!
This report includes the following:
CHAPTER 2: PROBLEMS RELATED TO PROGRAMMING METHODS AND
INTEGRATED DEVELOPMENT ENVIRONMENT (IDE)
2. Explain the characteristics of procedural, object-oriented and event-driven
programming, conductance analysis of a suitable Integrated Development
Environment
(IDE). (LO2)
CHAPTER 3 THE PROCESS OF DEVELOPING A SOFTWARE USING AN
INTERGRATED DEVELOPMENT ENVIRONMENT(IDE)
3. Implement basic algorithms in code using an IDE (LO3) and determine the
debugging
process and explain the importance of a coding standard (LO4)
- To solve the problem, the programs are divided into subroutines, making the
problem simpler and easier to understand.
2.1.4 The relationship among event driven programming (EDP) and object-
oriented programming system (OOPs) and procedural-oriented programming (POP).
Error CS0103: The name 'Console' does not exist in the current context.
- This is one of the most basic errors. it's a coder that hasn't added the System library
which is supported by microsoft. This leads to the software's keywords not being recognized.
-The simplest way is to add the System library to the program with the statement:
using System;
- Once we have added the System library, we see that our program has somewhat
reduced bugs.
After fixing the bug, our program ran successfully!
The following are some examples of picture errors:
To begin, I'll need a login form and the source code given below.
Perform by Quoc Viet 43
Figure 28: Form Login
Figure 3-34: Look in the error list table for a syntax error
- Step 2: Look over the alert for any problems that may have occurred.
- When the teacher wants to delete any student's information, just select that student and
press delete. Before deleting the system will show a message to be sure of the user's choice
After completing this Assignment with my own efforts and with the help of my mentor.
During my study, he was very dedicated to teaching and always answered the questions
that I posed.
Because I have presented very fully the questions that the Assignment brief raised,
with clear examples, source code that I wrote myself. Moreover, I am confident that I can
self-study and can make a software process for business.