虫虫首页|资源下载|资源专辑|精品软件
登录|注册

Pseudocode

  • 书名:Foundations of Algorithms Using C++ Pseudocode, Third Edition 作者:Richard Neapolitan 出版:Jones

    书名:Foundations of Algorithms Using C++ Pseudocode, Third Edition 作者:Richard Neapolitan 出版:Jones and Bartlett Publishers 2003 ISBN:0763723878

    标签: Foundations Algorithms Pseudocode Neapolitan

    上传时间: 2014-09-03

    上传用户:bjgaofei

  • This book uses the Python language to teach pro - gramming concepts and problem -solving skills,

    This book uses the Python language to teach pro - gramming concepts and problem -solving skills, without assuming any previous program- ming experience. With easy-to-understand examples, Pseudocode, flowcharts, and other tools, the student learns how to design the logic of programs and then implement those programs using Python. This book is ideal for an introductory programming course or a programming logic and design course using Python as the language. As with all the boolts in the Starting Out With series, the hallmark of this text is its clear, friendly, and easy -to-understand writing. In addition, it is rich in example programs that are concise and practical. The programs in this book include short examples that highlight specific programming topics, as well as more involved examples that focus on problem solving. Each chapter provides one or more case studies that provide step -by-step analysis of a specific problem and shows the student how to solve it.

    标签: language gramming concepts problem

    上传时间: 2014-01-11

    上传用户:独孤求源

  • 代码大全Steve McConnell著 919页高清文字版

    软件开发人员必备工具书,,目录如下Welcome to Software Construction [1]1.1 What Is Software Construction?1.2 Why Is Software Construction Important?1.3 How to Read This Book......7.1 Valid Reasons to Create a Routine7.2 Design at the Routine Level7.3 Good Routine Names7.4 How Long Can a Routine Be?7.5 How to Use Routine Parameters7.6 Special Considerations in the Use of Functions7.7 Macro Routines and Inline RoutinesDefensive Programming [5.6 + new material]8.1 Protecting Your Program From Invalid Inputs8.2 Assertions8.3 Error Handling Techniques8.4 Exceptions8.5 Barricade Your Program to Contain the Damage Caused by Errors8.6 Debugging Aids8.7 Determining How Much Defensive Programming to Leave in Production Code8.8 Being Defensive About Defensive ProgrammingThe Pseudocode Programming Process [4+new material]9.1 Summary of Steps in Building Classes and Routines9.2 Pseudocode for Pros9.3 Constructing Routines Using the PPP9.4 Alternatives to the PPP......

    标签: 代码大全 软件开发

    上传时间: 2021-12-08

    上传用户:20125101110