Analysis on the use of a development methodology

Assignment Help Computer Engineering
Reference no: EM132317832

Assignment

Overview

For this assignment, you will logically extend the functionality of the Maze Game introduced during the lectures, via the modification of the code base as well as documentation and implementation of various user stories. This is a paired assignment. However, in case of an exceptional situation (if the number of students in a group is 3), the group should take special permission from the Lecturer

Learning Outcomes

The following course learning outcomes are assessed by completing this assessment:
• Understand the significance of detailed project planning and control, good communication and documentation and the use of appropriate tools in order to provide a quality product
• Understand the distinction between software engineering and programming, and thus the distinction between a software configuration and a program.
• Understand the methods and techniques involved in designing, implementing and maintaining an information system, in particular using an object-oriented approach
• Understand how unit tests are used during software development to assist in agile programming techniques such as refactoring
• Work together in small teams to complete a fully documented, detailed design and implementation of a small business information system
• Demonstrate skills in designing and implementing an information system
• Demonstrate skills in designing Unit tests

Assessment Details

You are required to logically extend the functionality of the Maze Game introduced during lectures, via the modification of the code base as well as documentation and implementation of various user stories. You will use the Boost methodology discussed during lectures, which requires the use of pair programming. All documentation, other than the customized game map, must be completed individually.

The code base provided for this assignment has already implemented the "warm up" and some "sets". You will be implementing numerous other "sets" for this assignment using the Boost methodology. The "warm down" stage is not required.

You are free to take ideas discussed during lectures and implement these in your own version of the code base provided in Moodle for this assignment.

This assignment will be marked according to the functionality of your code, in addition to the elegance and extensibility of your design and the quality of your documentation.

Note: It is recommended that you spend some time familiarising yourself with the provided code base prior to beginning any work on this assignment. You should start by spending some time exploring the structure of the code to gain an understanding of the roles each class plays within the system and then complete Lab 7-8.

Assignment Requirements

In Pairs:

1. Design and implement a custom environment for your maze game. This requires producing your own unique hand-drawn map of the maze game environment and changing the HardCodedData file to reflect the locations and items on your map. At least M (M>=5) locations, including exactly N (N>=2) shops with a condition M>N, must be included, as well as enough items to allow for proper testing of the game functionality. For example, there must be sufficient items to verify that a player cannot collect an item if the weight restriction has been met. Note: you should not retain the original locations or items from the provided code base in your version of the game.

2. Implement each of the following deliverables/milestones:
a. functionality as detailed in Lab 7 and Lab 8
b. commands to manage the various item management commands:
i. listItems, getItem, and dropItem, to allow the listing of all held items, collect a new item and drop a held item.
ii. equipItem and unequipItem, to wear / wield a held item, and to stop wearing or wielding an equipped item.
iii. purchaseItem and sellItem, to buy an item from a vendor and to sell an item to a vendor.
iv. getmazestatus to show the status of the maze (i.e., value of M and N)

Ensure that weight restrictions are not exceeded and that the context for each command is appropriate. For example, purchasing and selling of items should only occur in a shop.

c. Basic combat functions, allowing a player to attack or to be attacked by a non-player character (NPC). A player may flee combat or continue to attack until such time as one combatant loses all life points. The end result must not be hard-coded, and neither the hostile NPCs nor player may have their attributes configured in such a way that the final outcome is pre-determined. Note that combat functions should only be available when the player is in the presence of a hostile NPC, and combat may take whatever form is appropriate for your game context rather than being limited to just hits with a weapon.

d. Collectable items that, when used, restore life points to a player. The number of life points regained should be determined by the roll of 2 six-sided dice up to the player's maximum health. You can elect to allow these to be used during combat if you wish.

3. Write Three Unit test cases for each of the methods you are developing in this assignment. You can write the test cases in any Java framework, but Junit is preferred.

4. Prepare a short Power-point presentation to demonstrate your software/program as if you are going to sell this software/program to a prospective customer. The Power-point presentation must contain the following items:

a. A demonstration of the game - how the game play works and how this was implemented.

b. Explanation of the role of design patterns in the game, clearly identifying the functionality where design patterns have had an impact and how this has occurred.

c. An analysis on the use of a development methodology in creating the game describing how did this assist, or make the development of the game more complicated.

This presentation will be assessed based on the clarity and accuracy of the explanations and how clearly it demonstrates an understanding of how the game was coded, the design patterns used and the impact of using a development methodology.

Individually:
1. Prepare an individual report, to be submitted as a Word document or a PDF, which includes:
a. The student number and name of each person on your team (including yourself)
b. User stories for each of the deliverables/milestones
c. Class diagrams for Lab 7 and Lab 8
d. Sequence diagrams for two (2) of the item management commands, taken from separate groupings (i.e. you will not get credit for both getItem and dropItem as they are both in group i)
e. A statement of your own personal contribution to the assignment
f. A statement of your partner's contribution to the assignment.

Attachment:- Software Engineering Analysis and Design.rar

Reference no: EM132317832

Questions Cloud

How does given web change security for the internet : Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security.
Calculate the marginal cost and marginal benefit : If my control variable is the number of study hours I will allocate to each exam, where do I go from there?
Define narrative on security techniques and mechanisms : Provide a short narrative on security techniques and mechanisms in protecting against spam activity. Find at least ten pieces of spam mail from any account.
Beneath each reference entry : Conduct research on the topic you have been working with since Unit 2. Beneath each reference entry, include an annotation of the source.
Analysis on the use of a development methodology : Design and implement a custom environment for your maze game - Understand the distinction between software engineering and programming, and thus the distinction
Describe the properties of the solow growth model : Summarize the contents of the video: the Solow growth model and the paper: Prosperity without growth. Both sources are listed above. Also question what is the.
To get most out of teams : To get most out of teams, how to we empower them? Explain, example
Why is communication through hierarchies never better : Why is Communication through hierarchies never better? Explain, example.
Describe controls that would be implemented for system : NIST SP800-18 Choose one of the NIST SP 800-53 family of controls and describe up to three controls that would be implemented for this system.

Reviews

len2317832

6/6/2019 11:29:43 PM

Individual Work Individual report containing team details and: a. User stories for each of the deliverables / milestones 10 b. Class diagrams for Lab 7 and Lab 8 10 c. Sequence diagrams for two of the item management commands from different groups. 10 Total 100 The percentage value of the Task 20%

len2317832

6/6/2019 11:29:36 PM

Pre-Requisites For Marking • Statement of personal contribution and partner’s contribution Task Available Marks Paired Tasks a. Functionality as detailed in Lab 7 and Lab 8 b. Keeping the provision of taking the values of M and N while the program is in execution c. Hand-drawn map detailing custom game environment, implemented in the game, with at least M different locations including exactly N shop(s), and items to allow for full testing d. Item management commands: i. listItems / getItem / dropItem ii. equipItem / unequipItem iii. purchaseItem / sellItem iv. getmazestatus e. Implementation of combat sequences between a player and hostile NPCs, including variable outcomes and the ability to flee. f. Implementation of collectable items used to restore a player’s life points g. Unit test h. Power-point presentation 6 6 6 3 3 3 3 5 5 15 15

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd