Journey beyond hells gate

Assignment Help Software Engineering
Reference no: EM131289842

Prepare the Software Requirements Specification.

The Journey Beyond Hell's Gate

Purpose

This text based game was created to further our knowledge of java, sql and the software development cycle as well as to satisfy the requirements

Scope

This text based game will be a console game called the Journey beyond Hell's gate. The game functions will be controlled through a graphical user interface which will consist of a command line for entering text based commands and an area for viewing your commands and information printed to the interface from the game. It will have a save and load feature as well as score keeping abilities. The user will have to navigate through a 50 room map fighting monsters and solving puzzles along the way.

Program will be developed using Java IDE Eclipse. Eclipse with be the main point of programming and will be where the program will be developed. All Java code will reside in Eclipse packages. Eclipse offers various built in Java classes that will be used in the creation of the program.

Product Perspective

Program will be similar to other adventure game, but will lack a graphical avatar that the user controls. Instead, the user will command the hero and interact with the game world by type text commands into the gui command line such as "help" or "move left". The gui will show descriptive text of environment, monsters and puzzles printed from the game as well as the user generated commands.

Program will not be self-contained. Program will be somewhat dependent on a database for room descriptions and puzzle and monster creations. Program will need the assistance of Eclipse and a database management system in order to function correctly.

Software Product Features

Performance Requirements
The interaction between the user and the computer will be limited to specific keys. Each key should have a specific functionality.

Design Constraints
Program must operate on a functional OS. Mac, Linux, and Windows OS all work for processing program. A Java JVM must be present on the computer that the program is being used in order for all Java files to run appropriately.

Reference no: EM131289842

Questions Cloud

The payment of interest and the amortization of the premium : On June 30, 2014, Mischa Auer Company issued $4,117,000 face value of 11%, 18-year bonds at $4,457,627, a yield of 10%. Auer uses the effective-interest method to amortize bond premium or discount. The bonds pay semiannual interest on June 30 and Dec..
What sample sizes are necessary to cover the whole region : What sample sizes are necessary to cover the whole region in which you live? Again use a confidence interval of 5 and a 95 percent confidence level.
Create security plan for a medium sized health care facility : Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization.
Find the diameter of the glass tube : At 60°C the surface tension of water is 0.0662 N/m and that of mercury is 0.47 N/m. Determine the capillary height changes in these two fluids when they are in contact with air in a glass tube of diameter 0.55 mm. Contact angles are 0° for water a..
Journey beyond hells gate : This text based game was created to further our knowledge of java, sql and the software development cycle as well as to satisfy the requirements - The game functions will be controlled through a graphical user interface which will consist of a com..
Determine the proper accounting treatment : Polska Corporation, in preparation of its December 31, 2014, financial statements, is attempting to determine the proper accounting treatment for each of the following situations. As a result of uninsured accidents during the year, personal injury su..
Discuss trends significant to the industry and company : Discuss trends significant to the industry and company and discuss key areas of uncertainty related to trends or events that potentially could impact the company's strategy.
Explain the role that marketing research played : Explain the role that marketing research played in the creation and launch of Domino's new pizza.- Are there more effective ways that Domino's could have gone about its research process?
Describe the public perception of an organized crime entity : Describe the public perception of an organized crime entity in America. Describe the parallels between professional criminals and white collar offenders.

Reviews

Write a Review

Software Engineering Questions & Answers

  Describe the software types

Reflect on how the software types and computer languages have evolved over time, and what this has meant for the use of these operating systems

  Create an interface design

Create an Interface design

  Data flow diagram for new customer support system

A context diagram, also called a Data Flow Diagram (DFD), documents the scope of the new customer support system. It focuses primarily on output from the system.

  Attacking small and medium businesses

Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers.

  How could core erp components aid improve business operation

How could core ERP components aid improve business operations at college? How could extended ERP components aid improve business operations at the college.

  Create pdm-cpm diagram for play

Given following information about staging community play on Independence day. Create the PDM / CPM diagram. Find out earliest completion time for play and the critical path.

  Describe the waterfall methodology and identify its relation

Describe the waterfall methodology and identify its relationship to the PMBOK process groups

  Discuss whether application of principles reduce the risk

Apply the principles put forth on p. 60 of this article, go back and review a software development project you were a part of and discuss whether the application of the principles of these authors could have reduced the risk of that project.

  Example of a business related report

Recognize an example of a business related report created with MS Excel. Attach a sample of the report in an Microsoft Excel file.

  Describe any two sdlc methodologies

Describe any two SDLC methodologies and compare contrast them. Devote 2 pages for each of the methodologies and one page to compare and contrast them.

  Web i want the best presentation and referencing because i

i want the best presentation and referencing because i need to score higher marks in this as the other assignment done

  Explain teaching hypervisor design and implementation

Teaching Hypervisor Design, Implementation, and Control to Undergraduate Computer Science and Computer Engineering Students

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd