Professional Documents
Culture Documents
Project in
ICT 02
CRAFT
FAIR
Members:
Acosta, Jerome
Angluben, Gabriella
Cadiao, Niel-Ju
Cervantes, Michael
Malolos, Jean
Program
Expressions
Operators
Variables
Constants
Hierarchy
Data
Types
Names
Numeric
Non-Numeric
Integer
Boolean
Long
String
Single
Double
Currency
Date
Variant
Filename Property
This property type allows you
to import a file or files.
Examples: Icon, Picture, Font,
MouseIcon, Palette, and
DataFormat.
Size Property
This property type allows you
to set the new size of an
object.
Examples: Height, ScaleWidth,
Width, ScaleTop, DrawWidth, and
ScaleHeight.
Events
Events
An event is a message that is sent
out by an object announcing that
something has happened.
When a user does a certain action to
an object in a Visual Basic program,
the computer responds with an
appropriate output based on what the
function of the object is.
Events
To signal this output in your
program, you must write (in
code) an event procedure that
is associated with an object.
Form1.BackColor = vbBlue
Object Name Property
Value
Software
Piracy
CRAFT
FAIR
Software Piracy
Software piracy
refers to the
unauthorized
duplication and
use of computer
software.
Thank You!
CRAFT
FAIR
Expressions and
Arithmetic Operators
Arithmetic Operators
Are used to indicate operations such
as addition, subtraction, division,
multiplication, exponentiation,
integer division, integer remainder
and modulus.
These operators are used to connect
number constants an nonnumeric
variables to form arithmetic
expressions
Visual Basic
Operation
Operator
Example
Answer
Exponentiation
3^2
Negation
3-2
Multiplication/
Division
* Or /
3*2 or 3/2
6 or 1.5
Integer Division
3\2
Modulus
Mod
3Mod2
Addition/
Subtraction
+ or -
3+2 or 3-2
5 Or 1
Variables, Constants,
and Data Types
What is a Variable?
A variable refrences a memory
location which can contain any
type of data. And the size of
the emmory allocates depends on
the type of data stored in it.
Naming Variables
A variable must begin with a letter of the
English alphabet
The reserved words or code words cant be
used as variable names (e.g. Then, For,
Len, Case, End, Mid, etc)
A variable name should not exceed 255
letters and can only use letters, numbers,
and the underscore character
Spacing in variable names is invalid (e.g.
Your School, Full Name, etc...)
Constants
It is a value that cannot and
should not be altered by the
program and is a set value for
a certain data within a
program.
These are declared
indifferently
Data Type
Range
Size
Example
Integer
2 Bytes
32 766
Long
2 Bytes
32769
Single
4 Bytes
0.000 005
8 Bytes
0.000 000
000 05
8 Bytes
1 002
500.5796
Currency
Data Type
Range
Size
Example
Boolean
True or False
2 Bytes
True
Date
8 Bytes
4-12-2000
Variant
16
Bytes
Hello World
Suffix
Example
Integer
Dim X%
X%=32766
Long
&
Dim X&
X&=32769
Single
Dim X!
X!=0.000005
Double
Dim X#
X#=0.00000000005
Currency
Dim X@
X@=1002500.5795
String
Dim X$
X$=Hello World
Word1=hello
Word2=world
Application
Len
Z=Len(Word)
Definition
Example
Lcase
Word=Programming
Z=LCase(Word)
Print Z
Output:
Programming
Ucase
Z=UCase(Wor
d)
Word=Programming
Z=UCase(Word)
Print Z
Output:
PROGRAMMING
Displays the
uppercase equivalent
of the string Word
Application
Left
Z=Left(Word)
Right
Mid
Definition
Example
Word=Programmin
g
Z=Left(Word, 4)
Print Z
Output:
Prog
Word=Programmin
g
Z=Right(Word, 8)
Print Z
Output:
gramming
Z=Mid(Word)
Word=Programmin
g
Z=Mid(Word, 4,4)
Print Z
Output:
Used to extract x2
characters from the
middle of the string
Word, beginning
with the character
Computer Virus
Computer Virus
A computer is a program maliciously
written with the intention of entering a
computer system without the users
permission or knowledge. Such codes hide
in computer programs or on the boot sector
of storage devices such as hard-disk
drives and other portable storage devices.
A virus has the ability to replicate
itself and may affect other programs or
system performance.
Types of Viruses
There is a variety of computer
viruses. Computer viruses can
be classified according to the
techniques, types of files they
infect, where they hide, or the
kind of damage they cause. Some
of these viruses are classified
as follows:
Macro Viruses
A virus that is created by
using a built-in macro
programming language, designed
to execute as soon as the file
is opened. It attaches itself
to a document file and waits
until an application like MS
Word or MS Excel opens it.
Worms
These are computer programs that are
characterized by their ability to copy
themselves from machine to machine. They
are deigned to self-replicate and spread
without any user influence. When a file
that contains a worm is opened, it starts
spreading through networks and emails
immediately. The main purpose of a worm
attack is to bring down systems and
networks by consuming great amounts of
bandwidth and memory.
Trojan Horses
These programs disguise themselves
as legitimate programs such as game
or utility. Trojan horse programs
often look and initially act like
legitimate programs, but once they
are executed, they can destroy or
scramble data. Different from other
viruses, Trojans do not replicate
themselves as fast as viruses do.
Bombs
These are pieces of code
intentionally inserted into a
software that will set off a
malicious function when specified
conditions are met. Such conditions
Can either be logical or timed.
Malicious software often contains
bombs that execute a certain
payload. Many viruses attack their
host system on specific dates, thus
called time bombs.
Thank you!
SHOPS
from LOCAL
ARTISTS &
CRAFTERS
CRAFT
FAIR