by @MUHAMMAD TALHA Fork
{"functions":[],"name":"New Program","main":{"rawId":"main","tpe":"Void","name":"main","statements":[{"@type":"Begin","id":"id_f7cbf5d7_c87e_4634_b93a_93f4db0f7eee"},{"lengthValue":-1,"@type":"Declare","lengthValue1":"5","tpe":"String","name":"department","lengthValue2":"5","id":"id_c7e61f23_accd_4096_a953_d71d56ec3f5e","initValue":null},{"@type":"Assign","name":"department","id":"id_c535052c_7752_4d7c_9535_3943c61ee7c2","value":"\"IT\""},{"lengthValue":-1,"@type":"Declare","lengthValue1":"5","tpe":"String","name":"Program","lengthValue2":"5","id":"id_200fa943_f6e5_42d3_98b7_b14ac17dd114","initValue":null},{"@type":"Assign","name":"Program","id":"id_6493eda8_825c_4669_a5c1_034b138a4157","value":"\"BS Cyber Security\""},{"newline":true,"@type":"Output","id":"id_1af4c9fc_1205_48c5_8d87_c7f6c005c5bd","value":"\"IT\""},{"newline":true,"@type":"Output","id":"id_01306af3_46de_4b72_a52e_cebae2cb8b86","value":"\"BS Cyber Security\""},{"@type":"Return","id":"id_81140edc_5059_42f0_95aa_f1da8edde66d","maybeValue":null}],"parameters":[]},"id":"id_7b41b1ca_36f8_4a72_960f_cf9e41a37ae0","config":{"showDebugVars":true,"useInputPrompt":true,"echoEnteredValue":true,"showIoBtns":true,"showFunctions":false,"lang":"c++","showGenCode":true},"version":"0.3","revision":204}