Implementation and testing, Computer Engineering

Assignment Help:

In this stage of the project you are required to create a Design document, the Design document must contain the following:  Structure chart

  • Pseudo-code
  • Data Dictionary

Stage Implementation and Testing

a) Implement a prototype based on the Analysis and Design you have carried out, your implementation must make use of the following programming requirements:

  • Sequence
  • Selection
  • Iteration
  • At least two different data structures (arrays and structure)
  • Functions / procedures

b) You are required to systematically test the completed prototype by a test plan(s), during the testing you need to complete a Test Log.  The Test Log will be submitted as part of the Technical Documentation.

Stage Technical Documentation

You are required to produce a formal technical document.  This document will collate a number of areas that relate to a number of previous sections of this assignment.  In some cases you would be able to borrow sections of your previous submitted work and copy and paste the information to produce a Technical Document.

The document should be presented in a professional manner, and must contain the following information:

  • Project outline - Specify what your program is expected to do
  • Problem identification - the Problem Statement that was submitted for Stage 1 (Planning and Analysis)
  • Problem solution
  • Program design - this is the design documents you create in Stage 2 (Design)
  • Source code - printout of the code you have written, making sure that the all the requirements for Stage 3 (Implementation) have been met as well as the code containing detailed comments
  • Testing
  • Test Plan(s)
  • Completed Test Log(s) [2.4] - was not part of the technical document marking criteria, but a suitable place to have this submitted

Stage 5 Other Documentation
 
Stage 5 a User guide
 
Create a professional looking User Guide to assist a novice in the use of your prototype that has been created

Stage 5 b Critical evaluation 

Produce a detailed critical evaluation of your completed project, the evaluation must reflect on the information you provided in the Analysis stage, discussing what you originally set out to achieve, what you managed to achieve, what you did not manage to achieve, and include recommendations of further improvements that could be made to your prototype to turn it into a complete application.


Related Discussions:- Implementation and testing

Explain time division switching, Explain Time Division Switching. Ti...

Explain Time Division Switching. Time Division Switching: A switching component can be shared at the same time with number of active speech circuits. It is the principle of

Describe the difference between cache and virtual memory, Question 1: (...

Question 1: (a) What do you meant by an expert system? (b) Describe benefits of the EDI. (c) Describe what you understand by: (i) File Infectors (ii) Boot Sect

Define http, Http Hyper Text Transfer Protocol: The WWW protocol that...

Http Hyper Text Transfer Protocol: The WWW protocol that performs the request and regain functions of a server. Generally seen as the first part of a website address. It is t

Draw and elucidate the block diagram 8259, Draw and elucidate the block dia...

Draw and elucidate the block diagram of programmable interrupt controller 8259. The 8259A adds 8 vectored priority encoded interrupts to microprocessor. It can be expanded to 6

more data items and methods, Create a class called ticket that records the...

Create a class called ticket that records the information of a performance ticket.The class should include at least six data items: performanceId, seatRow, seatNo, class, price, da

Diffrence between RISC and CISC architecture, Q. Diffrence between RISC and...

Q. Diffrence between RISC and CISC architecture? CISCs provide better support for high-level languages since they include high-level language constructs such as CASE, CALL etc

Coupling and cohesion, Coupling and cohesion can be shown using a:- Dep...

Coupling and cohesion can be shown using a:- Dependence matrix

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Exit command, Your shell must accept the exit command. This command will ...

Your shell must accept the exit command. This command will be in the form: e x i t When you encounter this command, your shell should terminate. Please note that when you

Define the working of flip flops, Define the working of Flip Flops? Fli...

Define the working of Flip Flops? Flip flop is the basic unit of storage this is used to store one bit of information. Flip-flops are the synchronous bistable devices. The term

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd