-
CIVE 1331
Computing for Engineers
Fall 1997

INSTRUCTOR:	Todd Helwig

MEETING TIMES: Monday and Wednesday  4 - 5 p.m.
			Classroom - W122 D3
Laboratory: You must be registered for one of the following lab sections to be enrolled in this lecture section: 
			01779, M 7-9pm, W124-D3
			01781, W 8-10am, W124-D3
			01775, F 12-2pm, W124-D3

OFFICE HOURS (Rm. N136 Bldg. D):	MW    1-3 p.m. 
T TH   1 p.m. - 4 p.m.

PHONE:		743-4284

Texts: 		1."Spreadsheet Tools for Engineers" by Byron S. Gottfried, 
2."Engineers Toolkit": Includes:  Problem Solving and Design, Mathematica 2.2, Fortran 77.
Laboratory Notes and selected course notes will be available in a directory \\FISH\UHCOURSES\CIVE 1331\FALL1997\HELWIG\...

GRADING POLICY:	3 Quizzes   - 3 x 12%  =  36%
				Laboratory Exam -      =  20%
				Projects     -  3 x 10%  =  30%
				Laboratory Notebook  =  14%
				Final Grades:	Average   ³ 90%	A - Range
							    ³ 80%	B - Range
							    ³ 70%	C - Range
							    ³ 60%	D - Range
							    £60%	F 

If you are going to miss an exam due to illness or emergency you must contact me as soon as possible.  Whether you get the opportunity to take an exam over will be considered on a case by case basis.  

Due dates for Projects and Labs are firm.  Very few exceptions will be made.

Attendance: Roll will be taken periodically during the lectures, and at each laboratory.  Excessive absences will be considered in final grades.

 GENERAL DESCRIPTIONS OF ACADEMIC DISHONESTY

"Academic dishonesty" refers to employing a method or technique or engaging in conduct in an academic endeavor that the student knows or should know is not permitted by the University or a course instructor to fulfill academic requirements.  Academic dishonesty includes, but is not limited to, the following:

1. Stealing, as theft of tests or grade books, from faculty offices or elsewhere;

2. Using "crib notes", as unauthorized use of notes or the like to aid in answering questions during an examination;

3. Securing another to take a test in the student's place; both the student taking the test for another and the student registered in the course are at fault;

4. Representing as one's own the work of another without acknowledging the source;

5. Changing answers or grades on a test that has been returned to a student in an attempt to claim instructor error;

6. Giving or receiving unauthorized aid during an examination, as trading examinations, whispering answers, passing notes and the like;

7.  Open cheating in an examination, such as copying from another's paper;

8.  Using another's laboratory results as one's own, whether with or without the permission of the owner;

9.  Falsifying results in laboratory experiments;

10. Mutilating or stealing library materials; misshelving materials with the intent of reducing accessibility to the other students;

11. A student's failure to report to the instructor or chairman an incident which he/she believes to be a violation of the academic honesty policy;

12.  Any conduct which a reasonable person in the same or similar circumstances would recognize as dishonest, or improper in an academic setting.

	Under 12 above, Academic Dishonesty includes:

	a. Picking up and using or discarding another student's computer output;
	b. Using the computer account of another student;
	c. Representing as one's own the work of another;
d. Giving another student a copy of your work on an assignment before the due date.

Academic dishonesty of any kind will result in either zero credit for the particular project or one full letter grade from the final course grade - whichever is worse!!!

** This list of items were taken from CIVE 1331 Course Notes from Professor Theodore G. Cleveland from the Fall 1995 Semester.

 Engineers' Creed

As a Professional Engineer, I dedicate my professional knowledge and skill to the advancement and betterment of human welfare.

I pledge:

	To give the utmost of performance;

	To participate in none but honest enterprise;

To live and work according to the law of man and the highest standards of professional conduct;

To place service before profit, the honor and standing of profession before personal advantage, and the public welfare above all other considerations.

In humility and with need for Divine Guidance, I make this pledge.
 CIVE 1331
Computing for Engineers
Fall 1997
Course Schedule (tentative):


Week of	Lecture Topic	Subjects	Comments
25-Aug.-97	Administration	Introduction, Computer Hardware	Get Computer Accounts
1-Sep.-97	Windows	Windows, Email, Internet, MS Word, accessories	
8-Sep.-97	Windows	Word, PowerPoint	
15-Sep.-97	Excel	Introduction, Functions	
22-Sep.-97	Excel	Arrays, Matrix Algebra	
29-Sep.-97	Excel	Linear Regression, Graphing	Exam 1 on 1 Oct. 97
6-Oct.-97	Excel	Macros, Review	Proj. 1 due 6 Oct. 97
13-Oct.-97	Mathematica	Introduction	
20-Oct.-97	Mathematica	Functions, Statistical Process Control	
27-Oct.-97	Mathematica	Graphing, Review	Exam 2 on 29 Oct. 97
3-Nov.-97	FORTRAN	Introduction, structure	Proj. 2 due 3 Nov. 97
10-Nov.-97	FORTRAN	Subroutines, functions	
17-Nov.-97	FORTRAN	File input/output	
24-Nov.-97	FORTRAN	Finish FORTRAN	
1-Dec.-97	FORTRAN	Review	Proj 3 due on 1 Dec.97Exam 3 on 3 Dec. 97






 Weekly Lab Assignments: An important aspect of this course is attending and participating in the weekly labs.  Many of the labs will require some calculations or work which must be completed before students come to the lab.  Completion of the required work will be checked at the beginning of each lab.  Reports from the previous week  are due at the beginning of each lab.  Grading of the labs will generally be based on the following point distribution:

	Lab Attendance ( and punctuality) : 1 pnt.   ( 0.5 pnt. deducted if more than 5 minutes late)  	Completed hand calculations or preparatory work: 2 pts. ( defaults to attendance if none)
	Completed Lab: 7 pts.

Projects:

1.  Introduction:  There will be three course projects assigned throughout the semester.  The project assignment sheet and corresponding data will be made available the week of the assignment on the engineering domain server: 
2.  \\FISH\UHCOURSES\CIVE1331\FALL1996\HELWIG\PROJECTS.  

2. Project Grading:  The projects will be graded according to the following table:

	Technical Requirements					50%
	Presentation Requirements				30%
	Programming Style (defaults to technical if n/a)		20%
	Total							100%

3. Technical Requirements:  Reflects your ability to meet the technical requirements specified in the project assignment sheet.

4. Presentation Requirements: The report should be intelligible, neat, and free from grammatical, spelling, and formatting defects.  It is to be organized with the following general format:

		Title Page
		Abstract
		Table of Contents
		Introduction
		Problem Statement
		Data-describe the input and output
		Example of Hand Calculation
		Description of Algorithm and flowchart (if applicable)
		Solution code verification and validation
		Results
		Conclusions
		References
Appendices - includes hard copy of input/output files and other pertinent information.

5. Programming Style:  This reflects your ability to incorporate sound programming style.  This includes the organized structure of the program and liberal program commenting.


Setting up Shortcuts in Windows 95 or Windows NT 4.0 

In past versions of Windows (Windows for Workgroups 3.1 or less, and 
Windows NT 3.51 or less), the windows environment consisted of 
different program groups that contained icons for the different 
programs.  To start the program the user simply moved the pointer 
for the Mouse over the desired icon and "double-clicked" the left 
mouse button to start the program.  The environment in Windows 95
 and Windows NT 4.0 is quite different than past Windows environments. 
 The programs and control settings can be found by moving the mouse
 pointer to the lower left hand corner of the screen to the "Start" 
button which will pop up with additional options.  To find a desired
 program we go to the Programs Menu and an additional pop-up panel 
appears.  We then find the program that we wish to use and select 
the program with the right mouse button. 

Starting programs that we use daily in the manner described above 
is generally a pain.  If we know where the executable (filename.exe)
 file is located, however, we can form a shortcut to the program. 
 A shortcut to a program is simply an icon on the background which
 starts the program when double-clicked.  This saves us the trouble 
of having to go to the "Start" button-Programs-Program Group-Program
 each time that we want to use the program.  

We will be using a program named QVTNET32 in the next lab.  QVTNET32 
is simply a program which has tools for use on a computer network.  
Two of the programs which are often used are:
TELNET - allows a user to log in to a computer from a remote terminal.
However, the telnet session is a command line interface which requires 
some basic command knowledge of the user.

FTP - File Transfer Protocal - allows a user to send and receive 
files from a file server.  The version of FTP on QVTNET is also a
 command line interface, however, there are a number of GUI type 
versions for FTP.  One of the more popular versions is WSFTP.

QVTNET32 is located on the server FISH.  The path to the executable
 is //FISH/pubapps/qvtn3988.  To create a shortcut to the program,
 place the mouse cursor on the background (not above an existing 
icon) and push the right mouse button.  A pop-up menu will appear 
from which you should select (with left mouse button) New and then 
Shortcut.  Once you select Shortcut, a pop-up panel will appear that
 will allow you to put the pathway to the executable file or "browse"
 to find the executable.  If you select "browse" (recommended), go to
 the "Network Neighborhood" and choose FISH then pubapps and then 
qvtn3988.  The executable file will usually have a small picture 
(similar to the icon).   Choose QVTNET32 and then select the "Next" 
button, and finally the "Finish" button.  The shortcut icon will 
appear on the background.  

You can move the shortcut anywhere on the background that you wish by
 placing the pointer over the icon and holding the left mouse button 
down while you drag the icon to the desired position.  To start the 
program you simply double click on the icon.  As we begin to study 
new pieces of software this semester you will typically want to make 
new shortcuts to the software. 

Computer Software

In contrast to "hardware", software generally consists of executable 
programs that provide instructions to be conducted by the CPU.  The 
most fundamental piece of software consists of the "operating system"
 which allows us to interface with the computer.

DOS - Original PC's (IBM compatibles) predominantly made use of DOS
 (Disk Operating System).  In the mid-1980's there began to be a push 
to the Window's environment which was similar to the operating system
 on Macintosh computers.  More recent versions of Windows have actually
 become the operating system.  The new Windows operating systems still
 provide "DOS Prompt" applications, however these systems are actually
 emulating the DOS environment.

Windows -  The Windows environment provides a "Graphical User 
Interface" (GUI) that allows the user to navigate on the computer 
by pointing at objects on the screen with a device such as a mouse. 
 The nice feature of a true Windows operating system is that it permits
 "multi-tasking" which means the user can perform different operations
 simultaneously.  We can open several pieces of software and switch 
back and forth between the programs.  The latest versions of Windows 
for PC's are Windows NT and Windows 95.  The next successor to Windows 
95 will probably be Windows 98 which will ship next around May of next
 year.   

MS Excel - Spreadsheet that allows the user to perform calculations on
 data, write programs within the spreadsheet to manipulate the data, or
 create graphs as well as a number of other functions.

MS Word - Word processor that allows the user to create documents.  The
 user can create tables with the document or embed figures created with
 other software.

MS Powerpoint - Program for creating figures or presentations.  Allows 
drawing simple figures or creating "bullet" charts.

1Computer Hardware

In order to effectively use a computer it is important to have a 
knowledge of some of the important hardware which makes up the computer
.  One of the basic terms  that is necessary to be familiar for
 discussing some of the hardware is the term "byte".  The computer 
stores data and instructions in storage elements called bits.  A group
 of eight bits is called a byte.

Mother Board - All of the hardware elements plug into a main board 
called the Mother Board.

Hard disk drive- User files and programs are stored in the computer
 on the hard disk.  Technology in the area of hard disks has changed 
significantly in the last few years.  In the early eighties when 
personal computers first started to become popular, the size of a hard
 disk for a computer was approximately 40 MB (mega bytes = 1,000,000 
bytes).  The sizes of hard disks has steadily been increasing over the 
years, however, the costs of these disks have decreased significantly 
over the last two years.  Personal computers now come standard with 
2.0-4.0 GB (Giga bytes = 1,000,000,000 bytes).  

3.5 inch "floppy" disk drives - The term "floppy" originated with 5.25"
 disks which were relatively flexible.  3.5" disk drives have become 
the standard media for storing user files.  The 3.5" disks have 
essentially replaced the  5.25" drives which were standard for several
 years.  You can still get 5.25" drives, however the 3.5" drives are
 essentially the standard format.  The 3.5" disks have capacities of 
1.44 MB.  

Zip Disks - Compression disks which are more durable than "floppy" 
disks and can hold 100 MB of data.  There are also drives which can
 hold up to 1 GB of compressed data.

CD ROM Drives - CD ROM's have become standard hardware elements on 
personal computers.  The speed of these drives have significantly 
increased in the last year.  Current computers may come with 8X speed
 CD ROM's.  Most current drives are "read only" drives, however
 "optical drives" are beginning to become more affordable.  Optical
 drives allow reading and writing to CD's.  A typical Optical disc can
 hold approximately 650 MB of data.

DVD Drives - The latest technology in video/audio/data.  The potential
 for data storage substantially exceeds conventional Optical (CD) 
discs.  A single side - single layer of a DVD disc can hold 4.6 GB 
of data.  The discs will probably  eventually be double sided/double
 layered which will allow more than 17 GB per disc.  The video is much
 better than conventional VCR tape and the audio capabilities have 5.1
 channels which is better than conventional audio CD.  

RAM - The main memory of a computer is referred to as RAM.  When you 
begin using the computer and starting programs and opening user files,
 the computer loads the programs into RAM which is fast memory that
 stops the computer from having to access the hard drive for 
information.  Most computers now come standard with 16 MB RAM, however
 32 MB RAM or higher are also used on PC's.  Large servers may have 
hundreds or even GB's of RAM. 

CPU - The part of the computer that performs operations on the data 
which is stored in the memory of the computer is called the "central
 processing unit" (CPU).  The technology of the CPU's for personal 
computers has changed dramatically over the  several years.  The older
 technologies of PC chips have been called 286, 386, or 486's.  The 
latest technologies is actually a 586 chip, however it is usually 
referred to as a pentium chip.  Pentium chips are also coming in a 
Pentium Pro format as well as dual processor configurations.  These
 forms of the Pentium are designed for better performance of file 
servers or "number crunching" machines.  When discussing the speed of 
a particular chip we also often refer to the "clockspeed" of the chip.  This refers to the speed that the chip operates at.  The clockspeed is referred to as a 166 Mhz (megahertz) Pentium.  


In addition to the above hardware items, different "cards" are also 
necessary to help the computer interface with elements such as the 
monitor (computer screen), and possibly a "network".  Two such cards
 that would be used are a video card for the graphics, and an ethernet
 card that will interface with a "network".  A "modem" may also be 
used to interface with phone lines to allow the user to call up a 
computer system from a remote location.

CIVE 1331 COMPUTING FOR ENGINEEERS
LAB 1 - Setup Accounts - 25August 1997

1. Introduction. 

The objective of this lab to establish your Windows NT network account and your email / VAX account.  These accounts are necessary for you to gain access to the computing facilities at the university.  Both of these accounts are to be operational prior to the second week of class.

2.  Deliverables.

None.