Implementation and testing, Computer Engineering

Assignment Help:

In this stage of the project you are required to create a Design document, the Design document must contain the following:  Structure chart

  • Pseudo-code
  • Data Dictionary

Stage Implementation and Testing

a) Implement a prototype based on the Analysis and Design you have carried out, your implementation must make use of the following programming requirements:

  • Sequence
  • Selection
  • Iteration
  • At least two different data structures (arrays and structure)
  • Functions / procedures

b) You are required to systematically test the completed prototype by a test plan(s), during the testing you need to complete a Test Log.  The Test Log will be submitted as part of the Technical Documentation.

Stage Technical Documentation

You are required to produce a formal technical document.  This document will collate a number of areas that relate to a number of previous sections of this assignment.  In some cases you would be able to borrow sections of your previous submitted work and copy and paste the information to produce a Technical Document.

The document should be presented in a professional manner, and must contain the following information:

  • Project outline - Specify what your program is expected to do
  • Problem identification - the Problem Statement that was submitted for Stage 1 (Planning and Analysis)
  • Problem solution
  • Program design - this is the design documents you create in Stage 2 (Design)
  • Source code - printout of the code you have written, making sure that the all the requirements for Stage 3 (Implementation) have been met as well as the code containing detailed comments
  • Testing
  • Test Plan(s)
  • Completed Test Log(s) [2.4] - was not part of the technical document marking criteria, but a suitable place to have this submitted

Stage 5 Other Documentation
 
Stage 5 a User guide
 
Create a professional looking User Guide to assist a novice in the use of your prototype that has been created

Stage 5 b Critical evaluation 

Produce a detailed critical evaluation of your completed project, the evaluation must reflect on the information you provided in the Analysis stage, discussing what you originally set out to achieve, what you managed to achieve, what you did not manage to achieve, and include recommendations of further improvements that could be made to your prototype to turn it into a complete application.


Related Discussions:- Implementation and testing

Explain documentation libraries, The documentation rules are almost exactly...

The documentation rules are almost exactly the similar as for Scripts "Documenting scripts". Although from a technical point of view it is feasible to place measures in libraries i

Describe one graphics and image editing tool, Question : Multimedia inv...

Question : Multimedia involves multiple modalities of text, audio, images, drawings, animation, and video (a) Describe three popular file formats for images (b) Most imag

Macroscopic and microscopic approaches - thermodynamics, Macroscopic and Mi...

Macroscopic and Microscopic approaches - Thermodynamics: Thermodynamic studies are undertaken by following two different approaches.  l. Macroscopic approach (Macro mean big)

Explain ps-2 connector, PS/2 connector (PS/2 keyboards): These were int...

PS/2 connector (PS/2 keyboards): These were introduced with IBM's PS/2 computers and therefore are known as PS/2 connectors.  They have 6-pins but actually their wiring is just

Explain folded network, Explain Folded network. Folded network: While...

Explain Folded network. Folded network: While all the inlets/outlets are connected to the subscriber lines, the logical connection shows as demonstrated in figure. When, the

Asymptotic notations, Asymptotic Notations These notations are used fo...

Asymptotic Notations These notations are used for evaluating functions. Assume we have two functions f(n) and g(n) defined on real numbers, Theta Notation Big Notation

Enumerate in brief about the intranet security policy, Enumerate in brief a...

Enumerate in brief about the Intranet security policy An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situa

Why pointer variable to a function as an argument, Why pointer variable som...

Why pointer variable sometimes desirable to pass a pointer to a function as an argument? Frequently, a called function needs to make changes to objects declared in the calling

Show the developments that happened in third generation, Q. Show the develo...

Q. Show the developments that happened in third generation? The main developments that happened in third generation can be summarized as below: Application of IC circuit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd