Implementation and testing, Computer Engineering

Assignment Help:

In this stage of the project you are required to create a Design document, the Design document must contain the following:  Structure chart

  • Pseudo-code
  • Data Dictionary

Stage Implementation and Testing

a) Implement a prototype based on the Analysis and Design you have carried out, your implementation must make use of the following programming requirements:

  • Sequence
  • Selection
  • Iteration
  • At least two different data structures (arrays and structure)
  • Functions / procedures

b) You are required to systematically test the completed prototype by a test plan(s), during the testing you need to complete a Test Log.  The Test Log will be submitted as part of the Technical Documentation.

Stage Technical Documentation

You are required to produce a formal technical document.  This document will collate a number of areas that relate to a number of previous sections of this assignment.  In some cases you would be able to borrow sections of your previous submitted work and copy and paste the information to produce a Technical Document.

The document should be presented in a professional manner, and must contain the following information:

  • Project outline - Specify what your program is expected to do
  • Problem identification - the Problem Statement that was submitted for Stage 1 (Planning and Analysis)
  • Problem solution
  • Program design - this is the design documents you create in Stage 2 (Design)
  • Source code - printout of the code you have written, making sure that the all the requirements for Stage 3 (Implementation) have been met as well as the code containing detailed comments
  • Testing
  • Test Plan(s)
  • Completed Test Log(s) [2.4] - was not part of the technical document marking criteria, but a suitable place to have this submitted

Stage 5 Other Documentation
 
Stage 5 a User guide
 
Create a professional looking User Guide to assist a novice in the use of your prototype that has been created

Stage 5 b Critical evaluation 

Produce a detailed critical evaluation of your completed project, the evaluation must reflect on the information you provided in the Analysis stage, discussing what you originally set out to achieve, what you managed to achieve, what you did not manage to achieve, and include recommendations of further improvements that could be made to your prototype to turn it into a complete application.


Related Discussions:- Implementation and testing

Define organizing, Q. Define Organizing? Grouping of related activities...

Q. Define Organizing? Grouping of related activities together, Identification of required activities and forming departments and coordinating various departments with the estab

Show the shared programming using library routines, Q. Show the Shared Prog...

Q. Show the Shared Programming Using Library Routines? The mainly well-liked of them is use of combo function known as fork() and join(). Fork() function is used to initialize

What is a verification point?, A verification point is a point in a script ...

A verification point is a point in a script that you make to confirm the state of an object across builds of the application-under-test.

fisherpersons are not over-fishing, Prepare the Relational Tables to signi...

Prepare the Relational Tables to signify the following situation, which is defined by means of text and an Entity Relationship Diagram. Note: Do not attempt to vary the ERD. Yo

Differentiate between sequential access and direct access, Question: (a...

Question: (a) Briefly explain how the functionality of the WWW has been enhanced, after its birth at CERN site. Use examples to illustrate your answer. (b) Many modern com

What are the authentication methods in .net, What are the authentication me...

What are the authentication methods in .NET?   1. WINDOWS AUTHENTICATION 2. FORMS AUTHENTICATION 3. PASSPORT AUTHENTICATION The authentication option for the ASP.N

Databse, defination of query ?

defination of query ?

Intelligent systems assignment, This logbook should be used to record decis...

This logbook should be used to record decisions, ideas, work done by your group on this assignment. Each group should keep one logbook, which must be submitted along with your sour

What are simm and dimm, What are SIMM and DIMM? SIMM are Single In-Line...

What are SIMM and DIMM? SIMM are Single In-Line Memory Module. DIMM is Dual In-Line Memory Modules. Such modules are an assembly of various memory chips on a separate small boa

What is public key cryptography, What is Public Key Cryptography Publi...

What is Public Key Cryptography Public-key cryptography is a form of modern cryptography which permits users to communicate safely without lastly agreeing on a shared secret

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd