Implementation and testing, Computer Engineering

Assignment Help:

In this stage of the project you are required to create a Design document, the Design document must contain the following:  Structure chart

  • Pseudo-code
  • Data Dictionary

Stage Implementation and Testing

a) Implement a prototype based on the Analysis and Design you have carried out, your implementation must make use of the following programming requirements:

  • Sequence
  • Selection
  • Iteration
  • At least two different data structures (arrays and structure)
  • Functions / procedures

b) You are required to systematically test the completed prototype by a test plan(s), during the testing you need to complete a Test Log.  The Test Log will be submitted as part of the Technical Documentation.

Stage Technical Documentation

You are required to produce a formal technical document.  This document will collate a number of areas that relate to a number of previous sections of this assignment.  In some cases you would be able to borrow sections of your previous submitted work and copy and paste the information to produce a Technical Document.

The document should be presented in a professional manner, and must contain the following information:

  • Project outline - Specify what your program is expected to do
  • Problem identification - the Problem Statement that was submitted for Stage 1 (Planning and Analysis)
  • Problem solution
  • Program design - this is the design documents you create in Stage 2 (Design)
  • Source code - printout of the code you have written, making sure that the all the requirements for Stage 3 (Implementation) have been met as well as the code containing detailed comments
  • Testing
  • Test Plan(s)
  • Completed Test Log(s) [2.4] - was not part of the technical document marking criteria, but a suitable place to have this submitted

Stage 5 Other Documentation
 
Stage 5 a User guide
 
Create a professional looking User Guide to assist a novice in the use of your prototype that has been created

Stage 5 b Critical evaluation 

Produce a detailed critical evaluation of your completed project, the evaluation must reflect on the information you provided in the Analysis stage, discussing what you originally set out to achieve, what you managed to achieve, what you did not manage to achieve, and include recommendations of further improvements that could be made to your prototype to turn it into a complete application.


Related Discussions:- Implementation and testing

Weighted harmonic mean and geometric mean, Problem Show which of the w...

Problem Show which of the weighted arithmetic mean, geometric mean or harmonic mean, you would use in each of the following case. Justify your answer in each case. (a)

Describe the types of flip-flops and latches, Describe the types of flip-fl...

Describe the types of flip-flops and latches. Flip-flops are of two types as illustrated below: a. Positive edge triggered b.  negative edge triggered Latches are

What are the data types of the external layer, What are the Data types of t...

What are the Data types of the external layer? The Data types of the external layer are :- ACCP, Char, CLNT, CUKY, CURR, DATS, DESC, FLTP, INT1, INT2, INT4, LANG, LCHR, L

State the basic properties of this analytical engine, State the basic prope...

State the basic properties of this analytical engine The basic properties of this analytical engine are: It was a common purpose programmable machine. It had provisi

Explain priority encoder with an example, Explain Priority encoder with an ...

Explain Priority encoder with an example. Ans. Priority encoder- Basically an encoder is a combinational circuit which performs the inverse operation of a decoder. The inp

Explain the criteria to classify data structures, Explain the criteria to c...

Explain the criteria to classify data structures used for language processors? The data structures utilized in language processing can be classified upon the basis of the subse

Face scanning security system - biometric, Face Scanning Security System - ...

Face Scanning Security System - Biometric Computer Security Systems Finally, face scanning security system are also one of biometric technologies. Generally, the principle of

How a shift register can be used as a ring counter, Explain how a shift reg...

Explain how a shift register can be used as a ring counter giving the wave forms at the output of the flipflops. Ans: Shift Register as a Ring Counter: A Ring Counter is a

What is jmx architecture, JMX is based on a 3-level architecture:   ?...

JMX is based on a 3-level architecture:   ? The Probe level have the probes (known as MBeans) instrumenting the resources. Also known as the Instrumentation level. ? The A

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd