DIT Third Year Assignment Booklet

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

Reg. No.

: 2000/000752/07

MAIN CAMPUS
292 SMITH STREET
DURBAN
4000

FACULTY OF INFORMATION TECHNOLOGY

DIPLOMA IN INFORMATION TECHNOLOGY

3rd YEARS

ACADEMIC YEAR 2022

ASSIGNMENT BOOKLET

Registered with the Department of Education as a Private Higher Education Institution under the
Higher Education Act, 1997. Registration Certification No. 2000/HE07/008
NB: 1. Candidates are advised to read the guide lines.
2. For reference use prescribed, recommended books and other source you may come across.
3. Correct referencing carries 10 Marks.

GUIDELINES

The purpose of an assignment is to ensure that the Learner is able to:


• Use methods of enquiry and research in a disciplined field.
• Interpret and evaluate text.
• Have a sound understanding of key principles and theories, rules and awareness.
• Solve unfamiliar problems using correct procedures as well as investigate and critically analyse
information and report thereof.
• Present and communicate information reliably and coherently.

Instructions and guidelines for writing assignments

1. Use the correct cover page provided by the institution.


2. All essay type assignments must include the following:
2.1 Table of contents
2.2 Introduction
2.3 Main body with subheadings
2.4 Conclusions and recommendations
2.5 Bibliography
3. The length of the entire assignment must have minimum of 5 pages. Preferably typed with font size 12
3.1 The quality of work submitted is more important than the number of assigned pages.
4. Copying is a serious offence which attracts a severe penalty and must be avoided at all costs. If any
learner transgresses this rule, the lecturer will retain the assignments and ask the affected learners to
resubmit a new assignment which will be capped at 50%.
5. Use the Harvard referencing method.
ASSIGNMENT DUE DATES

Module Due Date Signature

COMPULSORY MODULES

HUMAN COMPUTER INTERACTION 600 01 APRIL 2022

IT PROJECT MANAGEMENT 600 01 APRIL 2022

SOFTWARE ENGINEERING 600 13 APRIL 2022

QUANTITATIVE TECHNIQUES 600 13 APRIL 2022

Elective Module (ITM) 06 MAY 2022


• BUSINESS ANALYSIS 631
Elective Module (NE) 06 MAY 2022
• NETWORKS 631
Elective Module (SD) 06 MAY 2022
• PROGRAMMING 631
FACULTY OF INFORMATION TECHNOLOGY
HUMAN COMPUTER INTERACTION 600
1ST SEMESTER ASSIGNMENT

Name & Surname: _________________________________ ITS No: _______________________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ____________________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 30
QUESTION TWO 34
QUESTION THREE 26

TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS
Accurate numbering according to the numbering in text 2
and page numbers.
2. LAYOUT AND SPELLING
Font – Calibri 12
3
Line Spacing – 1.0
Margin should be justified.
3. REFERENCE
5
According to the Harvard Method
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:


QUESTIONS (90 MARKS)

QUESTION ONE (30 MARKS)

1.1 Discuss the ways in which a full-page word processor is or is not a direct manipulation interface for
editing a document using Shneiderman’s criteria. What features of a modern word processor break the
metaphor of composition with pen (or typewriter) and paper? (15)

1.2 What is the distinction between a process-oriented and a structure-oriented design


rationale technique? Would you classify psychological design rationale as a process or
structure oriented? (10)

1.3 Briefly discuss what is the basic architecture of a computer system? (5)

QUESTION TWO (34 MARKS)

2.1 Discuss how do you think new, fast, high-density memory devices and quick processors have
influenced recent development in Human Computer Interaction, do they make systems any easier
to use, and expand the range of application of computer systems? (10)

2.2 What are the Norman’s SEVEN principles for transforming difficult tasks into simple
ones? (14)

2.3 What influence does the social environment in which you work have on your interaction with the
computer, and what effect does the organization (commercial or academic) to which you belong
have on the interaction? (10)

QUESTION THREE (26 MARKS)

3.1 What input and output devices would you use for the following systems? For each, compare and
contrast alternatives, and if appropriate indicate why the conventional keyboard, mouse and CRT
screen may be less suitable. (26)

A. Portable Word Processor


B. Tourist Information System
C. Tractor-mounted crop-spraying controller
D. Air Traffic Control System
E. Worldwide Personal Communications System
F. Digital Cartographic System.

TOTAL MARKS: 100


FACULTY OF INFORMATION TECHNOLOGY
IT PROJECT MANAGENT 600
1ST SEMESTER ASSIGNMENT

Name & Surname: _________________________________ ITS No: _______________________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ____________________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 45
QUESTION TWO 45

TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS
Accurate numbering according to the numbering in text 2
and page numbers.
2. LAYOUT AND SPELLING
Font – Calibri 12
3
Line Spacing – 1.0
Margin should be justified.
3. REFERENCE
5
According to the Harvard Method
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:


QUESTIONS [90 MARKS]

NB: You are required to answer the following two questions. Each question carries (45 marks) and your
answer for each question should be around 300 words minimum:

QUESTION ONE (45 MARKS)

1.1 With the aid of theory and practical examples, identify five common project risk strategies employed
to address threats that your project may face. (45)

QUESTION TWO (45 MARKS)

2.1 “Projects are often completed late”. With reference to this statement, describe the techniques you
would use as a project manager to improve the accuracy and reliability of your project schedule. In
responding to the question be sure to: critique project theory based on your experience and
understanding. This is important –don’t just “regurgitate” the theory. Provide examples, data or other
relevant information to support your discussion. Examples can be from work experience, research, and
study group experiences.

Your examples should demonstrate the theoretical points you are asserting in the questions. (45)

TOTAL MARKS: 100


FACULTY OF INFORMATION TECHNOLOGY
SOFTWARE ENGINEERING 600
1ST SEMESTER ASSIGNMENT

Name & Surname: _________________________________ ITS No: _________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ___________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 30
QUESTION TWO 30
QUESTION THREE 30

TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS 2
2. LAYOUT AND SPELLING 3
3. REFERENCE 5
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:


QUESTIONS [90 MARKS]

QUESTION ONE [30 MARKS]

1.1 Define coupling and then present a critical essay on the various types of coupling. Marks will be
awarded for personal experiences/practical examples. (15)

1.2 Write an argumentative essay on the role of testing in a software project. The essay should describe
testing's purpose and limitations, and touch upon black-box, white-box and acceptance testing,
ultrahigh reliability and beta-testing. (A mere list of definitions will receive little credit.) (15)

QUESTION TWO [30 MARKS]

Read the scenario below and answer the following questions:


You are working on an office automation project in the printing industry. The system to be developed is
meant to support the work of journal editors. The management objective for this project is to save labour
costs; the editors’ objective is to improve the quality of their work.
In the development of this project you may opt for two strategies. The first strategy is to start a thorough
analysis of the user requirements, after which the system is built according to these requirements. The
second strategy starts with less complete requirement analysis phase, after which a pilot version is
developed. This pilot version is installed in a few departments. Further development of the system is guided
by the gained experience in working with the pilot version.

2.1 What would you do if you were the manager? Discuss possible ramifications of these opposing
objectives on the project. (15)

2.2 Critically outline the pros and cons of both strategies described above. Which strategy do you favour?
Justify your answer with relevant theory. (15)

QUESTION THREE (30 MARKS)


3.1 Using examples, evaluate the open source model of software development. In your discussion
highlight some of its advantages and disadvantages. Furthermore, explain some of the alternatives
that also exist. (15)
3.2 Discuss and explain the software development life of a software system that can be represented as a
series of cycles within the Unified Process. (15)

TOTAL MARKS: 100


FACULTY OF INFORMATION TECHNOLOGY
QUANTITATIVE TECHNIQUES 600
1ST SEMESTER ASSIGNMENT
Name & Surname: _________________________________ ITS No: _________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ___________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS

MARKS FOR CONTEN


QUESTION ONE 30
QUESTION TWO 20
QUESTION THREE 30
QUESTION FOUR 15
TOTAL MARKS 95
MARKS FOR TECHNICAL AS PECTS
1. TABLE OF CONTENTS 2
2. LAYOUT AND SPELLING 5
3. REFERENCE 3
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:
QUESTION ONE (30 MARKS)

1.1 For the periods 2014 to 2019, ESKOM’s electricity percentage price adjustments are given in the
following table:

2014/15 2015/16 2016/17 2017/18 2018/19

7.05% 31.70% 8.18% 1.62% 2.82%


Table 1: Average percentage price adjustments

a) Find the Average (arithmetic mean) percentage price adjustment from


2014 to 2019 (5)
b) Find the Geometric Mean for the same period (5)
c) Use your answer in a) and b) above to comment on the differences between the two
means. What is the effect of outliers on both the two means? (5)

1.2 The daily electricity consumption in 10 of RICHFIELD’s campuses is given in the table below:

Durban Town Durban PMB Witbank Rustenburg


Umhlanga
80 kWH 78 kWH 65 kWH 88 kWH 56 kWH

Randburg Pretoria Midrand Krugersdorp Jo’burg


Church Square
77 kWH 89 kWH 208 kWH 40 kWH 28 kWH

Table 2: Electricity consumption per campus in Richfield

Using the data given in the table above, find:

a) Median (1)
b) Lower Quartile (1)
c) Upper Quartile (1)
d) IQR (2)
e) Range (1)
f) Compare you Range and IQR from the answers above. Explain the difference in the
two. (4)

1.3 Use the table and your answers in 1.2 to draw a Box and Whisker plot. (5)

Page 11 of 22
QUESTION TWO (20 MARKS)

2.1 With the aid of a table, find the sample Standard Deviation of the following dataset:
X = {2.2, 4.7, 6.3, 5.8, 5.7, 7.2, 2.6, 2.4, 6.1, 6.8} (10)

2.2 IQ tests were carried out to find the relationship between age and IQ. A group of 10
people ranging from the ages of 8 to 68 was used as a sample and the results were
recorded in the table below:
Age 8 12 15 25 28 35 38 50 60 68

IQ 102 115 123 122 118 113 110 105 88 78

Table 3: Relationship between Age and IQ

a) Find Pearson’s Correlation Coefficient between age and IQ. (5)


b) Find the coefficient of determination. (3)
c) Given your answer above, comment on the linear association between age
and IQ. (2)

QUESTION THREE (30 MARKS)

3.1 Apart from being in the education sector, Richfield also has a fleet of cars available for rent.
Statistics shows that the Mercedes AMG G63 is the most rented car among their fleet and one in
four customers request this make.

If 5 of today’s rentals are selected, what is the probability that 2 clients would have rented an
AMG G63? (15)

3.2 Bicycles for hire at the Durban Beach front are deemed beyond repair when one or both its
wheels are damaged. According to current statistics, there is an 8% chance that the front wheel
gets damaged and a 12% chance the back wheel gets damaged.

What is the probability that a hired bike will be deemed beyond repair, provided that the wheels
get damaged independently of each other? (15)

QUESTION FOUR (15 MARKS)

4.1 Using the z-table, find the following Normal Probabilities:

a) P(z<1.46) (3)
b) P(2.1<z<1.32) (2)

Page 12 of 22
4.2 Debonairs Pizza discovered that their Pizza delivery times are normally distributed with a mean
of 45 minutes and standard deviation of 8 minutes.

What is the probability that:

a) The Pizza they delivered last took between 45 minutes and 50 minutes to
deliver (5)
b) The next Pizza will take less than 47 minutes to deliver (5)

TOTAL MARKS: 100

Page 13 of 22
FACULTY OF INFORMATION TECHNOLOGY
BUSINESS ANALYSIS 631
1ST SEMESTER ASSIGNMENT

Name & Surname: _________________________________ ITS No: _________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ___________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 30
QUESTION TWO 30
QUESTION THREE 30

TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS
1. TABLE OF CONTENTS
Accurate numbering according to the numbering in text 2
and page numbers.
2. LAYOUT AND SPELLING
Font – Calibri 12
3
Line Spacing – 1.0
Margin should be justified.
3. REFERENCE
5
According to the Harvard Method
TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:

Page 14 of 22
QUESTIONS 90 MARKS

QUESTION ONE (30 MARKS)

REVIEWING REQUIREMENTS OVER A CUP OF COFFEE

Years ago, Phil was the technical team lead for a team working on an executive compensation system
for top-level management. The team needed input from a small, closed community of senior and
executive management customers in order to define the current and future processes. Unfortunately,
his key contact from this group felt that the job of customer interface had been given to a young, up-
and-coming star who didn’t have a clue. This made developing a rapport with the key customer
contact almost impossible. However, the project deadlines remained inflexible, as they usually do.

Taking what little input was offered and doing significant research from other sources, the team
compiled their draft of the business requirements document. The document was huge. It was single-
spaced and double-sided, and it filled a 3-inch binder. There was a meeting to step through it. The
customer contact was there and took her place at the head of the table. Phil sat at the opposite end
of the table.

During the meeting, the customer’s demeanor grew increasingly agitated. She hurled the
requirements document down the table along with the exclamation, “I don’t do this kind of menial
work.” Unfortunately, Phil reacted by returning the document in the same manner. His aim wasn’t
quite as true, and the document slammed into her coffee cup sending a spray of hot, sugary liquid into
her lap. Her color changed from the red of aggravation to the scarlet of rage. She stalked out of the
room. So much for creating rapport with the customer! In the end, it all worked out. Both parties
apologized, and the project (meeting the business requirements that had been approved) was
delivered. But how much better things could have been if this situation had been avoided in the first
place.

Technical skills and expertise are necessary on the project team, but they are not the skills and
knowledge that separate effective business analysts from the pack. Superior business analysis skills
are not necessarily derived from a superior set of technical skills.

QUESTIONS:

1. A business analyst is currently defining a set of changes to the current state of an


organization that allows the organization to take advantage of a business opportunity.
Explain what changes are most likely being defined? (10)

2. What knowledge area contains the next most logical steps after the business analyst has
built a business case and gained management approval for a project? (10)

3. You are a business analyst measuring alternatives against objectives and identifying trade-
offs to determine which possible solution is best. Discuss the factors most likely to be
engaged in the various activities Discuss the factors most likely to be engaged in the various
activities. (10)

Page 15 of 22
QUESTION TWO (30 MARKS)

CASE STUDY: WHAT EXACTLY AM I SUPPOSED TO BE DOING?

Russ discovered early in his career as a project manager that all plans are not created equal. He was a
replacement for the project manager on a fairly complex data center consolidation project. Russ
stepped in near the end of the first major phase of project work, which was developing the user
requirements for the new data center.

One of his first tasks was to review the current project plan and evaluate the progress to date. Russ
noticed that the requirements development work was shown as a single two-week task in the project
plan with no additional details about the requirements process itself. Because the resulting user
requirements document was shown as a completed deliverable and this task was marked as 100
percent complete, he decided to look at the new capabilities the project would provide to the business
and its users. So he did.

After reading the first four pages of the document, Russ knew there was a problem. He finished
reading the user requirements document, closed the file on his computer, and reached for the phone
to call the lead business analyst for this effort into his office. When Mary arrived, he asked her, “What
exactly is this document supposed to be? Is this just a high-level concept that we need to now go out
and define?” Mary replied that the document was the final, approved user requirements document.
All the business analysis team had to do now was give the document to the developers. The developers
would figure out the rest.

Russ asked Mary to explain the process she and her team had gone through to produce the
deliverable. She explained that she had worked in tandem with the development director to elicit,
analyze, and specify the user requirements for the project. Basically, the key users had not been
involved or consulted at all. As Mary was quick to point out, “That wasn’t in the plan, so that wasn’t
how I did the work.” Basically, the user requirements work had to begin all over again and had to be
done correctly the second time.

Russ worked closely with his business analysis team to plan the requirements development work in
far greater detail. This time around, the team gave themselves adequate time to elicit and analyze the
requirements and planned the time to validate the requirements when everything was complete.
Completing the rewritten user requirements took five additional weeks of work. Funnily enough, this
didn’t impact the scheduled end date. The original requirements would have been impossible to use
for the design and construction of the data center.

Remember that your focus is on planning and monitoring the business analysis work for a project, not
on planning and managing the whole project. That is the responsibility of the project manager.
However, in either case, the plans need to be built and implemented at the appropriate level of detail.

QUESTIONS:
1. You are a business analyst addressing who will receive weekly business analysis status
reports containing performance against actuals for your current project. Describe each task
that would need to be completed in the compilation of the status reports. (10)

2. Discuss what technique might be used when determining the business analysis approach on a
project? (10)

Page 16 of 22
3. When identifying business analysis performance improvements, what technique allows you
to determine the metrics used for measuring performance and determining how those
metrics may be tracked? (10)

QUESTION THREE (30 MARKS)

CASE STUDY: PALMER DIVIDE VINEYARDS—BUSINESS GOALS, OBJECTIVES, AND NEED

As you become more involved with your Palmer Divide Vineyards work, you decide that you need to
take a quick look at the organization’s existing business goals, objectives, and needs as part of your
current state analysis. As discussed in a recent team meeting, you would like to make sure you have
it right. The team is curious about how the green initiative and your IT requirements development
part of it fit into the organization’s strategic plan. The team likes the idea of becoming a certified Green
Business. However, they would like to validate how this business goal fits with the organization’s long-
term strategy and make sure that the project is really worth doing.

There are many aspects to attaining green certification, and the winery has initiated this current
project to help achieve this strategic goal. A business objective for this effort is to conserve 20 percent
of the current energy and water resource consumption within the next 18 months. The business need
triggering the project came from combining the owner’s strategic plans, a desire to operate an organic
winery, and a perceived market advantage from selling green-labeled organic wines to the public.

QUESTIONS:

1. According to the case study what output contains the results of the business analyst assessing
the capability gaps between existing and new capabilities of the organization? (10)

2. When analyzing the current state, the business analyst looks at the scope of decision making
at different levels in the organization. Explain what elements of the current state are they
looking at? (10)

3. Which business analysis technique allows the business analyst to leverage existing materials
to analyze the current state of the enterprise relative to a business need? (10)

TOTAL MARKS: 100

Page 17 of 22
FACULTY OF INFORMATION TECHNOLOGY
NETWORKS 631
1ST SEMESTER ASSIGNMENT

Name & Surname: _________________________________ ITS No: _______________________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ____________________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 30
QUESTION TWO 30
QUESTION THREE 30

TOTAL 90
MARKS FOR TECHNICAL ASPECTS
TABLE OF CONTENTS 2
LAYOUT AND SPELLING 3
REFERENCES 5
TOTAL 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:

Page 18 of 22
QUESTIONS [90 MARKS]
QUESTION ONE [30 MARKS]

1.1 Describe the functionality provided by the Transmission Control Protocol (TCP) (10)

1.2 Indicate, in the correct order, the layers of the TCP/IP protocol stack that are implemented on
the following network components:
i. End System (Host)
ii. Router
iii. Switch (15)

1.3 What is end-to-end congestion control and how is it achieved in TCP? (5)

QUESTION TWO [30 MARKS]

2.1 Describe how Domain Name Service (DNS) works and how DNS add efficiency to a network.
Explain and illustrate the operation using a diagram. (15)

2.2 With the use of a well-labelled diagram, explain DNS caching and DNS cache poisoning (15)

QUESTION THREE [30 MARKS]

Security is an obvious concern with any network either wired or wireless. Since communication over
a traditionally wired network is, by its very nature, over physical wires, security is built into the physical
environment itself. WLANs operate over radio signals, so the same security measures cannot be
assumed.

3.1 For Business and Enterprise users, network and data security is of utmost concern. To address
this, there are a number of precautions that a WLAN user can adopt to prevent a network from
hacker attacks, unauthorised access, and corporate espionage. Discuss various security measures/
precautions that can be adopted in preventing these attacks. (15)

3.2 Encryption, to a large extent can been adopted to restrict access to data/ information only to
intended receiver. With the use of a well-labelled diagram, discuss various types of encryption and
its operations. (15)

TOTAL: 100 MARKS

Page 19 of 22
FACULTY OF INFORMATION TECHNOLOGY
PROGRAMMING 631 (JAVA)
1ST SEMESTER ASSIGNMENT

Name & Surname: _________________________________ ITS No: _______________________________

Qualification: ______________________ Semester: _____ Module Name: __________________________

Submission Date: ____________________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS
MARKS FOR CONTENT
QUESTION ONE 40
QUESTION TWO 20
QUESTION THREE 40

TOTAL MARKS 100


Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:

Page 20 of 22
QUESTION ONE (40 MARKS)

1. Create a java program that will count all words in a sentence. The program should have a
minimum of two classes.
1.1 The first class should be named class1, this class will have the following:
• The main method (starting point) (5)
• The object of class2 (5)
• Should also call the get method count_words(String str) (5)

1.2 The second class should be named class2, this class should have the following:

• A constructor (5)
• A get method named count_words(String str) (10)
1.3 Construct a flowchart for class1 and class2 both combined. (10)

QUESTION TWO (20 MARKS)

Create a Java program that will display the first 40 pentagonal numbers. Hint: A pentagonal number
is a figurate number that extends the concept of triangular and square numbers to the pentagon, but,
unlike the first two, the patterns involved in the construction of pentagonal numbers are not
rotationally symmetrical. (20)

Expected Output:
1 5 12 22 35 51 70 92 117 145

176 210 247 287 330 376 425 477 532 590

651 715 782 852 925 1001 1080 1162 1247 1335

1426 1520 1617 1717 1820 1926 2035 2147 2262 2380

2501 2625 2752 2882 3015 3151 3290 3432 3577 3725

Page 21 of 22
QUESTION THREE (40 MARKS)

3.1 Write a Java program that will compute the future investment value at a given interest rate for a
specified number of years. The java program should have a minimum of two classes.
3.1.1 classA
• The main method (starting point) (5)
• The object of classb (5)
• Should also call the void method named futureInvestmentValue (double investment
Amount, double monthlyInterestRate, int years) (15)

3.1.2 classB
• A get method named count_words(String str) (15)

Expected Output:

Input the investment amount: 28000


Input the rate of interest: 7
Input number of years: 6
Years Future Value
1 30024.12
2 32194.57
3 34521.92
4 37017.51
5 39693.51
6 42562.95

TOTAL MARKS: 100

Page 22 of 22

You might also like