Pārlūkot izejas kodu

README-en.md edited online with Bitbucket

Jose R Ortiz Ubarri 8 gadus atpakaļ
vecāks
revīzija
a728fd48e1
1 mainītis faili ar 10 papildinājumiem un 8 dzēšanām
  1. 10
    8
      README-en.md

+ 10
- 8
README-en.md Parādīt failu

4
 ![main2.png](images/main2.png)
4
 ![main2.png](images/main2.png)
5
 ![main3.png](images/main3.png)
5
 ![main3.png](images/main3.png)
6
 
6
 
7
-[Verano 2016 - Ive - Rafa - Ive]
7
+[Verano 2016 - Ive - Rafa - Ive- Tatiana]
8
 
8
 
9
-Arrays help us to store and work with groups of data of the same type. The data is stored in consecutive memory spaces which can be accessed by using the name of the array and indexes or subscripts that indicate the position where the data is stored. Repetition structures provide us a simple way of accessing the data within an array. In today's laboratory experience you will practice the use of counters and one dimensional arrays to implement a program in which you will use Benford’s Law to detect files with bogus data.
9
+Arrays help us to store and work with groups of data of the same type. The data is stored in consecutive memory spaces which can be accessed by using the name of the array and indexes or subscripts that indicate the position where the data is stored. Repetition structures provide us a simple way of accessing the data within an array. In today's laboratory experience, you will practice the use of counters and one dimensional arrays to implement a program in which you will use Benford’s Law to detect files with bogus data.
10
 
10
 
11
 
11
 
12
 
12
 
42
 
42
 
43
 
43
 
44
 
44
 
45
-As part of your new job as IT auditor you suspect that someone in the Chicago Transit Authority (CTA) has been tampering with the information systems and changing the data files that contain the bus route daily totals. You are given five text files that contain daily totals for each of the CTA’s bus routes and must determine if one or more of the files contain bogus data. In this laboratory experience you will implement a program that will help you determine which of the file(s) contain bogus data using Benford's Law, a property that is observed in many real-life sources of data. 
45
+As part of your new job as IT auditor you suspect that someone in the Chicago Transit Authority (CTA) has been tampering with the information systems and changing the data files that contain the bus route daily totals. You are given five text files that contain daily totals for each of the CTA’s bus routes and you must determine if one or more of the files contain bogus data. In this laboratory experience, you will implement a program that will help you determine which of the file(s) contain bogus data using Benford's Law, a property that is observed in many real-life sources of data. 
46
 
46
 
47
 ---
47
 ---
48
 
48
 
80
 ---
80
 ---
81
 
81
 
82
 
82
 
83
-Every time a leading digit `d` is found, the element with index `d` is incremented. For example, after reading the numbers  `890`, `3412`, `234`, `143`, and `112`, the array content would be:
83
+Every time a leading digit `d` is found, the element with index `d` is incremented. For example, after reading the numbers `890`, `3412`, `234`, `143`, and `112`, the array content would be:
84
 
84
 
85
 ----
85
 ----
86
 
86
 
138
 This laboratory experience requires you to read data from a text file. You can skip the next section if you feel that your file reading skills are competent. Otherwise, read on... 
138
 This laboratory experience requires you to read data from a text file. You can skip the next section if you feel that your file reading skills are competent. Otherwise, read on... 
139
 
139
 
140
 
140
 
141
-C++ provides functions to read and write data to/from files.  In this laboratory experience you will be using one of the most rudimentary file input/output schemes provided in C++ to read/write from **text** files. Text files consist exclusively of ASCII characters which represent data in any of the primitive types provided by C++. Typically, the values are separated by spaces. For instance lets asumme that the file `nameAge.txt` contains some data about names and ages.
141
+C++ provides functions to read and write data to/from files.  In this laboratory experience, you will be using one of the most rudimentary file input/output schemes provided in C++ to read/write from **text** files. Text files consist exclusively of ASCII characters which represent data in any of the primitive types provided by C++. Typically, the values are separated by spaces. For instance, let's assume that the file `nameAge.txt` contains some data about names and ages.
142
 
142
 
143
 ```
143
 ```
144
 Tomas 34
144
 Tomas 34
220
     inFile.open("nums.txt");
220
     inFile.open("nums.txt");
221
 
221
 
222
     if (!inFile.is_open()) {
222
     if (!inFile.is_open()) {
223
-        cout << "Error openning file nums.txt\n";
223
+        cout << "Error opening file nums.txt\n";
224
         exit(1);
224
         exit(1);
225
     }
225
     }
226
 
226
 
243
     inFile.open("names.txt");
243
     inFile.open("names.txt");
244
 
244
 
245
     if (!inFile.is_open()) {
245
     if (!inFile.is_open()) {
246
-        cout << "Error openning file names.txt\n";
246
+        cout << "Error opening file names.txt\n";
247
         exit(1);
247
         exit(1);
248
     }
248
     }
249
 
249
 
321
 
321
 
322
 ##References
322
 ##References
323
 
323
 
324
-[1] http://www.isaca.org/Journal/archives/2011/Volume-3/Pages/Understanding-and-Applying-Benfords-Law.aspx
324
+[1] http://www.isaca.org/Journal/archives/2011/Volume-3/Pages/Understanding-and-Applying-Benfords-Law.aspx
325
+
326
+