Write your pseudocode in a plain-text editor

Assignment Help Computer Engineering
Reference no: EM133626785

Part 1: Pseudocode and Flowchart

You'll create both pseudocode and a flowchart to design a mobile app. The app will write the device's latitude and longitude to a file each time the device's location changes. Use the techniques discussed in Section 3.3 and Chapter 10 of your textbook to write the latitude and longitude to the file as a record.

Review Appendices B and C in your textbook for guidance when working on your project. Use free trials of any of the programs listed in CSC105 Graded Project 1 to create the flowchart. Write your pseudocode in a plain-text editor such as Notepad or TextEdit, and save as a text file (*.txt). Also, save a screenshot of your flowchart as a JPEG file (*.jpg).

Part 2: GUI Design

In addition to creating pseudocode and a flowchart for your app, you'll also create a basic GUI design for your app. You can use Microsoft PowerPoint or Apache OpenOffice Impress to lay out your GUI and indicate components such as buttons, text boxes, sliders, and others. Be sure to label your GUI design with component names and indicate their properties. When you're finished, save your GUI design as a Portable Document Format (PDF) file (*.pdf).

You can download and experiment with an integrated development environment such as Microsoft Visual Studio or Apache NetBeans. These programs allow you to create windows for GUI programs. However, you aren't required to use them for this project.

Keep the following guidelines in mind when designing your app and GUI:

Ensure you understand the problem the app needs to solve.
Create storyboards (sketches of how you want to design your program).
Define the classes, objects, and connections.
Plan the logic.
Make the interface natural, predictable, attractive, and user-friendly.
Present less information at once.
Use larger fonts to make reading easier.
Arrange components in a way that works for the smaller screen size.
Use components that work well with touchscreens.

Reference no: EM133626785

Questions Cloud

Create a new table named large_ports : Create a new table, named LARGE_PORTS, using the existing PORT table as your source. A large port is defined as any port with more than 25 docks
Identify three pros and cons to counseling in community : Identify three pros and three cons to counseling in the community or home and explain your reasoning.
How do you find an external ip address attempting : How do you find an external IP address attempting to communicate with the firewall that comes back as malicious when using an open sourse intelligence to like
Identify the type of mitigation : The parts you've ordered might not arrive on time - or at all for that matter. Give a mitigation solution and identify the type of mitigation.
Write your pseudocode in a plain-text editor : Write your pseudocode in a plain-text editor such as Notepad or TextEdit, and save as a text file (*.txt). Also, save a screenshot of your flowchart as a JPEG
What concern have from using handwritten notes vs electronic : As a counselor, what concerns might you have from using handwritten notes versus electronic. What concerns might a client have?
How to pass data from a controller to a view : How to pass data from a controller to a view without using a model. In Chapter 4, you learned that you can add a model to both controllers
Discuss the specific scheduling risks : Using your course project, discuss the specific scheduling risks and uncertainties that you will face in your project and the likelihood of them occurring.
Create an html document in your text editor : Create an HTML document in your text editor and type the declaration, element, document head, and element

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss selected interest area and justification

Introductory Statement. Literature review. Discuss selected interest area and justification. Problem statement- The problem should be evidenced-based and focus

  Could you tie all pestles factors to cybersecurity

Could you tie all PESTLES factors to cybersecurity as they relate to organizational threats and vulnerabilities. Please provide examples and references

  Create a 10-integer array called data

Prepare a C++ program to - Create a 10-integer array called data

  Define the spirit of the recursion theorem of a program

define the spirit of the recursion theorem of a program.

  How did you respond and how was that behavior perceived

How did you respond and how was that behavior perceived by your manager? Which behaviors do you think would have been most effective in shaping your behavior

  Which website can an ethical hacker visit to see web pages

CMIT 321- Which website can an ethical hacker visit to see web pages from 2002? Which of the following statements best describes a penetration test?

  Activities as an individual or a small business owner

Examples of how Information Systems plays a role in your daily activities as an individual or a small business owner

  As a software engineer what are the means of tracking you

as a software engineer what are the means of tracking you would use to track and monitor the reuse history of a

  Developing a new customer order entry system

State the rule that is applied to place an entity in first normal form. Revise this data model so that it is in first normal form.

  Find the fewest words from wordbank whose letters can be

Find the fewest words from wordbank whose letters can be rearranged to form goal.

  What personal information is collect by capps

What personal information is collect by CAPPS

  The discussion board db is part of the core of online

the discussion board db is part of the core of online learning. classroom discussion in an online environment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd