C programming is presented with an introduction to methods for design of well-structured and maintainable computer programs. The course begins by introducing the syntax and semantics of the C programming language. This includes the use of structures and of pointers with a view to a later introductio
C programming is presented with an introduction to methods for design of well-structured and maintainable computer programs. The course begins by introducing the syntax and semantics of the C programming language. This includes the use of structures and of pointers with a view to a later introduction to the C++ language.
Techniques for producing easily maintained and modifiable code are emphasised. An introduction to elementary data structures (lists, stacks and queues) is included. Practical activity includes the use of basic software development tools (context sensitive editors, debugging techniques, version control). The course concludes with an introduction to the C++ programming language.
Assessment
1st Attempt: 1 three-hour written examination paper (90%) and in-course assessment (10%).
Established to serve the north-east of Scotland, today our university is a global presence in higher education. A dual focus on our region and the wider world is as important to us today as it was five centuries ago.
Open to all
The University is committed to four key areas which guide our present work and future direction.
Java Enterprise Edition is built on top of Java SE. It is intended for the development of distributed web applications and stand-alone command-line applications and user interfaces.
Welcome to our JavaScript Programming Level 1 course, where you'll embark on an engaging journey into the world of code, creativity, and interactive art.
This course will teach you how to build apps with low-code techniques to simplify, automate, and transform business tasks and processes using Microsoft Power Platform.
Apply now to become a professional Scala Developer
As digital forensic examiners expand their knowledge and understanding of forensic artefacts within PCs, mobile phones and other devices, so they repeatedly encounter key evidence which is not appropriately reported by commercial forensic tools.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy